Monday, March 31, 2014

Patch management missteps facilitate cybercrime

Computerworld Security: March 31, 2014
===============================================================

Patch management missteps facilitate cybercrime

Failures in patch management of vulnerable systems have been a key enabler of
cybercrime, according to the conclusions reached in Solutionary's annual Global
Threat Intelligence Report out today, saying it sees botnet attacks as the
biggest single threat.
http://cwonline.computerworld.com/t/8888788/823929835/664074/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: CenturyLink~~~~~~~~~~~~~~~~~~~~~

The Business Case for the Enterprise Cloud

This article aims to explore the business case for the enterprise cloud,
focusing on public cloud Infrastructure-as-a-Service (IaaS). The discussion will
examine the business differences between enterprise and commodity cloud IaaS.
Topics to be covered include infrastructure services and support, automation,
management, and application services.

http://cwonline.computerworld.com/t/8888788/823929835/664075/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=249f2f3a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Google, Level 3 DNS services hijacked in Turkey
http://cwonline.computerworld.com/t/8888788/823929835/664076/19/

2. INSIDER: Kenneth van Wyk: Where mobile apps go wrong
http://cwonline.computerworld.com/t/8888788/823929835/664077/20/

3. Philips smart TVs can be attacked via default wireless connection
http://cwonline.computerworld.com/t/8888788/823929835/664078/21/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Velocity Technology Solutions, Inc.~~~~~~~~~~~~~~~~~~~~~

Secure, Agile ERP Best Practices

Take advantage of a more nimble and resilient ERP infrastructure. Learn how one
enterprise turned to hosted application services delivered via a virtual private
cloud.

http://cwonline.computerworld.com/t/8888788/823929835/664079/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=08113335

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Google, Level 3 DNS services hijacked in Turkey

Google said its free DNS (Domain Name System) service is being intercepted by
most Turkish ISPs as the country battles users trying to circumvent censorship
efforts by the government.
http://cwonline.computerworld.com/t/8888788/823929835/664076/29/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~

Exploring Business and IT Friction: Myths and Realities

IT Organizations with passion for and actions around customer experience will
lead the Service Revolution. Learn More>>

http://cwonline.computerworld.com/t/8888788/823929835/664080/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=02ae92c4

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: Kenneth van Wyk: Where mobile apps go wrong

More so than Web-based applications, mobile apps tend to have security design
flaws that attackers can exploit. (Insider; registration required)
http://cwonline.computerworld.com/t/8888788/823929835/664077/31/

Philips smart TVs can be attacked via default wireless connection

The latest firmware in some Philips smart TV models opens an insecure Miracast
wireless network, allowing potential attackers located in the signal range to
control the TV remotely and perform unauthorized actions.
http://cwonline.computerworld.com/t/8888788/823929835/664078/32/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8888788/823929835/641183/33/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8888788/823929835/643300/34/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8888788/823929835/604375/35/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8888788/823929835/598565/36/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Over the past year or so, smartphone innovation has hit a plateau. What do you
think phone makers should focus on to next to break the constraints of the
innovation curve?

http://cwonline.computerworld.com/t/8888788/823929835/663302/37/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8888788/823929835/156832/38/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8888788/823929835/311619/39/

Facebook: http://cwonline.computerworld.com/t/8888788/823929835/311620/40/

Twitter: http://cwonline.computerworld.com/t/8888788/823929835/311621/41/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8888788/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODg4Nzg4&x=7aff84ed

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8888788/823929835/72510/43/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8888788/823929835/231613/44/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8888788/823929835/72509/45/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:22 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive