Tuesday, March 18, 2014

Sally Beauty admits to payment card data breach

Computerworld Security: March 18, 2014
===============================================================

Sally Beauty admits to payment card data breach

Sally Beauty Holdings confirmed Monday that it fell victim to a data breach, an
incident that may have coincided with a project to update point-of-sale
terminals at its U.S. stores, a recent regulatory filing shows.
http://cwonline.computerworld.com/t/8879955/823929835/662039/17/

~~~~~~~~~~~~~~~~~~~ARTICLE: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~

Prolexic issues Cybersecurity threat: NTP Amplification

As the security community scrambles to reduce the number of vulnerable NTP
servers, attackers find ways to hit harder with fewer servers.

http://cwonline.computerworld.com/t/8879955/823929835/662040/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Court approves first-of-its-kind data breach settlement
http://cwonline.computerworld.com/t/8879955/823929835/662041/19/

2. Ron Miller: NSA can track every email, but it can't find a plane
http://cwonline.computerworld.com/t/8879955/823929835/662042/20/

3. Bitcoin-stealing malware hidden in Mt. Gox data dump, researcher says
http://cwonline.computerworld.com/t/8879955/823929835/662043/21/

4. Darlene Storm: Syrian Electronic Army attacks CENTCOM, but US Central Command denies it was hacked
http://cwonline.computerworld.com/t/8879955/823929835/662044/28/


~~~~~~~~~~~~~~~~~~~WEBCAST: OutSystems~~~~~~~~~~~~~~~~~~~~~

Four Myths of High-Productivity App Dev Debunked

David Norfolk of Bloor Research International discusses research that compares
two high-productivity platform as a service development platforms: OutSystems
Platform and Force.com from Salesforce.com. In this webcast he will debunk the
main myths surrounding high-productivity application development.

http://cwonline.computerworld.com/t/8879955/823929835/662045/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e206aef6

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Court approves first-of-its-kind data breach settlement

Courts have generally tended to dismiss consumer class-action lawsuits filed
against companies that suffer data breaches if victims can't show that the the
breach directly caused a financial hit.
http://cwonline.computerworld.com/t/8879955/823929835/662041/30/

Ron Miller: NSA can track every email, but it can't find a plane

When a world that's characterized by ubiquitous data collection and surveillance
can lose sight of a jumbo jet, you start to question the worth of all that
spying on us.
http://cwonline.computerworld.com/t/8879955/823929835/662042/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: BMC Software~~~~~~~~~~~~~~~~~~~~~

The Future of IT: Putting the Customer First

IT is adapting to this new world of consumerized technology, and focusing on its
own employees as internal customers.

http://cwonline.computerworld.com/t/8879955/823929835/662046/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bba76159

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Bitcoin-stealing malware hidden in Mt. Gox data dump, researcher says

An archive containing transaction records from Mt. Gox that was released on the
Internet last week by the hackers who compromised the blog of Mt. Gox CEO Mark
Karpeles also contains bitcoin-stealing malware for Windows and Mac.
http://cwonline.computerworld.com/t/8879955/823929835/662043/33/

Darlene Storm: Syrian Electronic Army attacks CENTCOM, but US Central Command denies it was hacked


SEA hackers targeted CENTCOM in response to US intentions to launch
cyberattacks on Syria. Although the attackers tweeted a screenshot showing
access to US Army data, US CENTCOM denied it was hacked. The US Army is
embarrassed, but it's in regards to Thrift Saving Plan spear phishing emails
traced back to the Army three weeks later; the fake e-mail was part of a
cybersecurity test, but it set off panic.
http://cwonline.computerworld.com/t/8879955/823929835/662044/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8879955/823929835/641183/35/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8879955/823929835/643300/36/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8879955/823929835/604375/37/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8879955/823929835/598565/38/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?

http://cwonline.computerworld.com/t/8879955/823929835/659292/39/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8879955/823929835/156832/40/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8879955/823929835/311619/41/

Facebook: http://cwonline.computerworld.com/t/8879955/823929835/311620/42/

Twitter: http://cwonline.computerworld.com/t/8879955/823929835/311621/43/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8879955/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODc5OTU1&x=2b0adc9d

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8879955/823929835/72510/45/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8879955/823929835/231613/46/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8879955/823929835/72509/47/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:09 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive