Tuesday, February 18, 2014

Third of Internet Explorer users at risk from active attacks

Computerworld Security: February 18, 2014
===============================================================

Third of Internet Explorer users at risk from active attacks

Microsoft late Thursday said that both Internet Explorer 10 and its predecessor,
IE9, were under attack by hackers exploiting an unpatched flaw in the browsers.
http://cwonline.computerworld.com/t/8858988/823929835/657035/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Simplify and Consolidate Data Protection for Better Results

Learn how IBM Tivoli Storage Manager Operations Center simplifies user
experience and speeds problem resolution.

http://cwonline.computerworld.com/t/8858988/823929835/657036/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b453cf50

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. 'The Moon' worm infects Linksys routers
http://cwonline.computerworld.com/t/8858988/823929835/657037/19/

2. Michael Horowitz: A Chromebook offers Defensive Computing when traveling
http://cwonline.computerworld.com/t/8858988/823929835/657038/20/

3. Thousands call, email Congress to protest NSA programs
http://cwonline.computerworld.com/t/8858988/823929835/657039/21/

4. Kickstarter hacked, user names and encrypted passwords accessed
http://cwonline.computerworld.com/t/8858988/823929835/657040/28/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~

Six Characteristics of an Effective Solution

Get best practices and real-world examples for using a data delivery system that
works with your workload automation solution in this white paper.

http://cwonline.computerworld.com/t/8858988/823929835/657041/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=50427495

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

'The Moon' worm infects Linksys routers

A self-replicating program is infecting Linksys routers by exploiting an
authentication bypass vulnerability in various models from the vendor's E-Series
product line.
http://cwonline.computerworld.com/t/8858988/823929835/657037/30/

Michael Horowitz: A Chromebook offers Defensive Computing when traveling


In response to the pathetic report by Richard Engel of NBC about computer
security in Russia and the Olympics, I argue that a Chromebook offers the most
security possible when visiting enemy territory, wherever that may be. This is
not the standard, oft-repeated advice offered by security companies. Trend Micro
(Engels tech companion) won't suggest Chromebooks. But I do.
http://cwonline.computerworld.com/t/8858988/823929835/657038/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Druva~~~~~~~~~~~~~~~~~~~~~

Narrow Down Your Endpoint Backup Shortlist

With this complimentary report you can:
- Discover the critical product capabilities that matter
- Learn about the unique backup needs of the mobile and office-centric
workforces
- See how the top backup vendors compare

http://cwonline.computerworld.com/t/8858988/823929835/657042/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1634dcd2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Thousands call, email Congress to protest NSA programs

Organizers of The Day We Fight Back, a protest Tuesday against U.S. National
Security Agency surveillance programs, called the effort a 'tremendous success,'
with nearly 100,000 phone calls made to U.S. lawmakers and 185,000 people
signing up to send email blasts to their congressional representatives.
http://cwonline.computerworld.com/t/8858988/823929835/657039/33/

Kickstarter hacked, user names and encrypted passwords accessed

The crowdfunding website Kickstarter said Saturday it had been hacked and that
user names, encrypted passwords and other data had been accessed.
http://cwonline.computerworld.com/t/8858988/823929835/657040/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8858988/823929835/641183/35/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8858988/823929835/643300/36/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8858988/823929835/604375/37/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8858988/823929835/598565/38/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

A recent survey found that 40% of tech support workers had to remove malware
from devices after employees visited adult content sites. Is this a problem at
your company?

http://cwonline.computerworld.com/t/8858988/823929835/656068/39/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8858988/823929835/156832/40/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8858988/823929835/311619/41/

Facebook: http://cwonline.computerworld.com/t/8858988/823929835/311620/42/

Twitter: http://cwonline.computerworld.com/t/8858988/823929835/311621/43/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8858988/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODU4OTg4&x=8e959809

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8858988/823929835/72510/45/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8858988/823929835/231613/46/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8858988/823929835/72509/47/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:57 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive