Monday, March 24, 2014

Attack hits Web servers with outdated Linux kernels

Computerworld Security: March 24, 2014
===============================================================

Attack hits Web servers with outdated Linux kernels

Web servers running a long-outdated version of the Linux kernel were attacked
with dramatic speed over two days last week, Cisco Systems said on Thursday.
http://cwonline.computerworld.com/t/8884619/823929835/662882/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM~~~~~~~~~~~~~~~~~~~~~

Pay-as-you-Grow Data Protection

IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium
businesses the opportunity to start out with only the individual solutions they
need, and add new functionalities as they grow.

http://cwonline.computerworld.com/t/8884619/823929835/662883/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c6c9099b

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Microsoft to review policies after admitting it searched customer email
http://cwonline.computerworld.com/t/8884619/823929835/662884/19/

2. Internet giants can access your data, too
http://cwonline.computerworld.com/t/8884619/823929835/662885/20/

3. Newest bug bounty touts $10K rewards, appeals for help in finding Flash flaws
http://cwonline.computerworld.com/t/8884619/823929835/662886/21/

4. NSA hacked into servers at Huawei
http://cwonline.computerworld.com/t/8884619/823929835/662887/28/


~~~~~~~~~~~~~~~~~~~WEBCAST: Druva~~~~~~~~~~~~~~~~~~~~~

Druva inSync: Endpoint Data Protection & Governance

75% of today's workforce is mobile, so you now need to think about protecting
corporate data on laptops and mobile devices. Druva inSync's integrated solution
enables you to effectively protect and govern this endpoint data.

http://cwonline.computerworld.com/t/8884619/823929835/662888/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=219a22be

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Microsoft to review policies after admitting it searched customer email

Microsoft promised to subject itself to a more rigorous process before searching
through its customers' email accounts in the future after a recent legal case
revealed that the company searched for evidence of theft of its trade secrets in
a Hotmail account.
http://cwonline.computerworld.com/t/8884619/823929835/662884/30/

Internet giants can access your data, too

Security protections have been tightened at many of the major online services,
as firms like Google and Microsoft pledge to protect their users against
unwanted prying eyes. But while many people fret about unwarranted government
access to their data, the Internet firms themselves play by their own set of
rules.
http://cwonline.computerworld.com/t/8884619/823929835/662885/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CA Technologies~~~~~~~~~~~~~~~~~~~~~

Strengthening the Role of Storage in the Dynamic Data Center

This paper helps to provide a realistic foundation for considerations for
leveraging storage clouds in a manner appropriate to the requirements of the
mainframe applications that support critical business processes.

http://cwonline.computerworld.com/t/8884619/823929835/662889/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ad13699c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Newest bug bounty touts $10K rewards, appeals for help in finding Flash flaws

A new entry in the cash-for-bugs business, the Internet Bug Bounty, recently
paid out its first $10,000 rewards.
http://cwonline.computerworld.com/t/8884619/823929835/662886/33/

NSA hacked into servers at Huawei

The U.S. National Security Agency has hacked into Huawei Technologies servers,
spied on communications of company executives and collected information to plant
so-called backdoors on equipment from the Chinese networking manufacturer,
according to reports published over the weekend.
http://cwonline.computerworld.com/t/8884619/823929835/662887/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8884619/823929835/641183/35/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8884619/823929835/643300/36/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8884619/823929835/604375/37/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8884619/823929835/598565/38/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?

http://cwonline.computerworld.com/t/8884619/823929835/659292/39/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8884619/823929835/156832/40/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8884619/823929835/311619/41/

Facebook: http://cwonline.computerworld.com/t/8884619/823929835/311620/42/

Twitter: http://cwonline.computerworld.com/t/8884619/823929835/311621/43/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8884619/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODg0NjE5&x=9d708081

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8884619/823929835/72510/45/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8884619/823929835/231613/46/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8884619/823929835/72509/47/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:26 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive