Tuesday, March 25, 2014

ATM malware, controlled by a text message, spews cash

Computerworld Security: March 25, 2014
===============================================================

ATM malware, controlled by a text message, spews cash

A group of enterprising cybercriminals have figured out how to get cash from a
certain type of ATM -- by text message.
http://cwonline.computerworld.com/t/8885339/823929835/663135/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

Prolexic issues Cybersecurity threat: NTP Amplification

As the security community scrambles to reduce the number of vulnerable NTP
servers, attackers find ways to hit harder with fewer servers.

http://cwonline.computerworld.com/t/8885339/823929835/663136/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Ron Miller: When will we start taking security seriously?
http://cwonline.computerworld.com/t/8885339/823929835/663137/19/

2. Robert L. Mitchell: Google to Gmail customers: You WILL use HTTPS
http://cwonline.computerworld.com/t/8885339/823929835/663138/20/

3. Rogue apps could exploit Android vulnerability to render devices unusable
http://cwonline.computerworld.com/t/8885339/823929835/663139/21/

4. Microsoft warns Word users of ongoing attacks exploiting unpatched bug
http://cwonline.computerworld.com/t/8885339/823929835/663140/28/

5. Obama eyes legislation to end NSA bulk phone data collection
http://cwonline.computerworld.com/t/8885339/823929835/663141/29/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Pay-as-you-Grow Data Protection

IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium
businesses the opportunity to start out with only the individual solutions they
need, and add new functionalities as they grow.

http://cwonline.computerworld.com/t/8885339/823929835/663142/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6d967a07

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Ron Miller: When will we start taking security seriously?

And what is going to have to happen before we see that we must set the smartest
minds on coming up with newer, safer and less complicated security methods?
http://cwonline.computerworld.com/t/8885339/823929835/663137/31/

Robert L. Mitchell: Google to Gmail customers: You WILL use HTTPS


Google's decision to make HTTPS encryption for Gmail users mandatory is a bad
idea. Here's why.
http://cwonline.computerworld.com/t/8885339/823929835/663138/32/

~~~~~~~~~~~~~~~~~~~WEBCAST: Druva~~~~~~~~~~~~~~~~~~~~~

Druva inSync: Endpoint Data Protection & Governance

75% of today's workforce is mobile, so you now need to think about protecting
corporate data on laptops and mobile devices. Druva inSync's integrated solution
enables you to effectively protect and govern this endpoint data.

http://cwonline.computerworld.com/t/8885339/823929835/663143/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e277e4c5

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Rogue apps could exploit Android vulnerability to render devices unusable

A vulnerability in Android that was publicly disclosed in mid-March could be
exploited by malicious applications to force devices into an endless reboot
loop, according to security researchers from Trend Micro.
http://cwonline.computerworld.com/t/8885339/823929835/663139/34/

Microsoft warns Word users of ongoing attacks exploiting unpatched bug

Microsoft today warned users of Word 2010 that in-the-wild attacks are
exploiting an unpatched vulnerability in the software.
http://cwonline.computerworld.com/t/8885339/823929835/663140/35/

Obama eyes legislation to end NSA bulk phone data collection

The Obama administration is set to propose legislation that will end the bulk
collection of phone data by the National Security Agency, according to a
newspaper report.
http://cwonline.computerworld.com/t/8885339/823929835/663141/36/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8885339/823929835/641183/37/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8885339/823929835/643300/38/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8885339/823929835/604375/39/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8885339/823929835/598565/40/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?

http://cwonline.computerworld.com/t/8885339/823929835/659292/41/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8885339/823929835/156832/42/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8885339/823929835/311619/43/

Facebook: http://cwonline.computerworld.com/t/8885339/823929835/311620/44/

Twitter: http://cwonline.computerworld.com/t/8885339/823929835/311621/45/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8885339/823929835/131135/46/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODg1MzM5&x=7ee390bc

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8885339/823929835/72510/47/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8885339/823929835/231613/48/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8885339/823929835/72509/49/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:14 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive