Monday, March 3, 2014

Secure smartphones are nice, but not enough

Computerworld Security: March 03, 2014
===============================================================

Secure smartphones are nice, but not enough

In the past week, two new ultra secure smartphones have been in the news. One is
called the Blackphone. The other is called the Black phone. The difference in
their names is a space. Here's what we know about the two most secure
smartphones ever created.
http://cwonline.computerworld.com/t/8868066/823929835/659305/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference ~~~~~~~~~~~~~~~~~~~~~

Register now: CSO Magazine's CSO40 Security Confab

On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would
like to invite you to register for CSO Magazine's spring 2014 conference – CSO40
Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta,
Georgia.

http://cwonline.computerworld.com/t/8868066/823929835/649203/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Gameover malware is tougher to kill with new rootkit component
http://cwonline.computerworld.com/t/8868066/823929835/659306/19/

2. Bitcoin malware count soars as cryptocurrency value climbs
http://cwonline.computerworld.com/t/8868066/823929835/659307/20/

3. Stephen Colbert pitches own security solution at RSA Conference
http://cwonline.computerworld.com/t/8868066/823929835/659308/21/

4. Everything You Know About Enterprise Security Is Wrong
http://cwonline.computerworld.com/t/8868066/823929835/659309/28/

5. Mobile app for RSA Conference exposes personal data
http://cwonline.computerworld.com/t/8868066/823929835/659310/29/

6. Jaikumar Vijayan: Booze, bots and other RSA ruminations
http://cwonline.computerworld.com/t/8868066/823929835/659311/30/

7. Bug bounty operator presses vendors to pick up patching pace
http://cwonline.computerworld.com/t/8868066/823929835/659312/31/

8. Sears finds no evidence of data breach -- yet
http://cwonline.computerworld.com/t/8868066/823929835/659313/32/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Kaspersky~~~~~~~~~~~~~~~~~~~~~

IT Security by the Numbers: Calculating the TCP

Humorist Franklin P. Jones may have said it best: "When you get something for
nothing, you just haven't been billed for it yet." These are wise words of
warning for businesses counting on so-called "free" IT security software.

http://cwonline.computerworld.com/t/8868066/823929835/659314/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e03a83c6

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Gameover malware is tougher to kill with new rootkit component

A new variant of the Gameover malware that steals online banking credentials
comes with a kernel-level rootkit that makes it significantly harder to remove,
according to security researchers from Sophos.
http://cwonline.computerworld.com/t/8868066/823929835/659306/34/

Bitcoin malware count soars as cryptocurrency value climbs

As bitcoin values jumped in the last months of 2013, malware designed to steal
the virtual currency exploded, security researchers from Dell SecureWorks said
this week.
http://cwonline.computerworld.com/t/8868066/823929835/659307/35/

Stephen Colbert pitches own security solution at RSA Conference

Stephen Colbert's pitch for new data security company "Cloud Fog" and other
highlights from RSA Conference keynote in San Francisco.
http://cwonline.computerworld.com/t/8868066/823929835/659308/36/

Everything You Know About Enterprise Security Is Wrong

Whether you're talking about your network, your company's building or your home,
a perimeter approach to security is no longer adequate. As McAfee discussed at
this week's RSA Conference, you can't provide physical or electronic security
simply by trying to prevent authorized access -- you have to rethink all types
to security to protect data and lives.
http://cwonline.computerworld.com/t/8868066/823929835/659309/37/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM Corporation~~~~~~~~~~~~~~~~~~~~~

Extreme Warehouse Speed for Fast Business Decisions

Informix ebook highlighting benefits of making decisions 'at the speed of
business'; and discusses optimizing warehouse performance; and simplifying
resources

http://cwonline.computerworld.com/t/8868066/823929835/659315/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=813306d3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mobile app for RSA Conference exposes personal data

A mobile application designed to make it easier for RSA Conference 2014
attendees to navigate the event and interact with their peers exposes personal
information, according to researchers from security firm IOActive.
http://cwonline.computerworld.com/t/8868066/823929835/659310/39/

Jaikumar Vijayan: Booze, bots and other RSA ruminations


SAN FRANCISO -- Dan Kaminsky looks like he could really use some rest. "Long
day?" I ask him. He shrugs. It's been a long several days, weeks, and months, he
says as we trudge our way to a table in the south foyer of San Francisco's
Moscone Center to talk about White Ops, a company he helped found.
http://cwonline.computerworld.com/t/8868066/823929835/659311/40/

Bug bounty operator presses vendors to pick up patching pace

Citing the need to prod software vendors to patch vulnerabilities even faster,
Hewlett-Packard's bug bounty program said it was shortening its
patch-or-go-public policy to 120 days.
http://cwonline.computerworld.com/t/8868066/823929835/659312/41/

Sears finds no evidence of data breach -- yet

Sears Holdings said a review of its systems does not show evidence yet of a data
breach as retailers continue to stay on guard in the light of payment card
terminal hacking at Target and Neiman Marcus.
http://cwonline.computerworld.com/t/8868066/823929835/659313/42/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8868066/823929835/641183/43/


DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]

To read the report, click here:
http://cwonline.computerworld.com/t/8868066/823929835/643300/44/

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8868066/823929835/604375/45/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8868066/823929835/598565/46/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?

http://cwonline.computerworld.com/t/8868066/823929835/659292/47/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8868066/823929835/156832/48/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8868066/823929835/311619/49/

Facebook: http://cwonline.computerworld.com/t/8868066/823929835/311620/50/

Twitter: http://cwonline.computerworld.com/t/8868066/823929835/311621/51/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8868066/823929835/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODY4MDY2&x=53ece9c9

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8868066/823929835/72510/53/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8868066/823929835/231613/54/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8868066/823929835/72509/55/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:26 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive