Wednesday, March 5, 2014

Pre-installed malware found on new Android phones

Computerworld Security: March 05, 2014
===============================================================

Pre-installed malware found on new Android phones

Security experts have long warned that downloading applications from third-party
marketplaces for the Android platform is risky, but now some fake versions of
apps have been found pre-installed on new phones.
http://cwonline.computerworld.com/t/8870297/823929835/659945/17/


IN THIS ISSUE

1. INSIDER: Why you need to segment your network for security
http://cwonline.computerworld.com/t/8870297/823929835/659946/18/

2. Evan Schuman: Mobile IT Roach Motel: Data checks in, but it won't check out
http://cwonline.computerworld.com/t/8870297/823929835/659947/19/

3. Steer clear of site offering to help get back lost Mt. Gox bitcoins
http://cwonline.computerworld.com/t/8870297/823929835/659948/20/

4. U.S. says Sprint overcharged for spy aid
http://cwonline.computerworld.com/t/8870297/823929835/659949/21/

5. Career advice: Moving into Internet security
http://cwonline.computerworld.com/t/8870297/823929835/659950/28/

6. Richi Jennings: NSA did it again? This time GnuTLS fails to check malicious certificates
http://cwonline.computerworld.com/t/8870297/823929835/659951/29/


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Sophos~~~~~~~~~~~~~~~~~~~~~

Gartner Magic Quadrant for Mobile Data Protection

Get the information you need to choose the right encryption product –
compliments of Sophos.

http://cwonline.computerworld.com/t/8870297/823929835/659952/30/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: Why you need to segment your network for security

Pen tester Mark Wolfgang argues segmenting for security is a key piece of an
overall defense-in-depth strategy. Here he explains why and how to accomplish it
in your organization (registration required)
http://cwonline.computerworld.com/t/8870297/823929835/659946/31/

Evan Schuman: Mobile IT Roach Motel: Data checks in, but it won't check out

Even if a company were willing to expunge personal data that it had been
authorized to collect, the realities of IT systems mean it probably could never
completely do that.
http://cwonline.computerworld.com/t/8870297/823929835/659947/32/

Steer clear of site offering to help get back lost Mt. Gox bitcoins

Empty-handed customers of bankrupt bitcoin exchange Mt. Gox are being targeted
in a ploy likely intended to distributed malware.
http://cwonline.computerworld.com/t/8870297/823929835/659948/33/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Kaspersky~~~~~~~~~~~~~~~~~~~~~

Cutting Complexity - Simplifying Security

Kaspersky Lab's latest whitepaper, "Cutting Complexity - Simplifying Security"
looks at how the latest IT Systems Management solutions can simplify and
automate a vast range of routine IT management tasks.

http://cwonline.computerworld.com/t/8870297/823929835/659953/34/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7621444c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

U.S. says Sprint overcharged for spy aid

Sprint has been sued in a federal court for allegedly overcharging federal law
enforcement agencies for surveillance related services by over 50%.
http://cwonline.computerworld.com/t/8870297/823929835/659949/35/

Career advice: Moving into Internet security

Premier 100 IT Leader Stuart Kippelman also answers questions on career growth.
http://cwonline.computerworld.com/t/8870297/823929835/659950/36/

Richi Jennings: NSA did it again? This time GnuTLS fails to check malicious certificates


CVE-2014-0092: "Sky falling. Film at 11."

GnuTLS, the widely-used open-source encryption library, has a simply horrible
bug. And it's had that bug since 2003. It has a similar effect to the
recently-discovered one in Apple OS code: It fails to correctly validate
certificates.

The conspiracy theorists are beginning to have a field day, with fingers
pointing in NSA's direction.

In IT Blogwatch, bloggers don their tinfoil hats.
http://cwonline.computerworld.com/t/8870297/823929835/659951/37/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8870297/823929835/641183/38/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8870297/823929835/643300/39/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8870297/823929835/604375/40/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8870297/823929835/598565/41/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?

http://cwonline.computerworld.com/t/8870297/823929835/659292/42/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8870297/823929835/156832/43/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8870297/823929835/311619/44/

Facebook: http://cwonline.computerworld.com/t/8870297/823929835/311620/45/

Twitter: http://cwonline.computerworld.com/t/8870297/823929835/311621/46/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8870297/823929835/131135/47/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODcwMjk3&x=f566d487

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8870297/823929835/72510/48/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8870297/823929835/231613/49/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8870297/823929835/72509/50/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:45 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive