Computerworld Security: March 03, 2014
===============================================================
Secure smartphones are nice, but not enough
In the past week, two new ultra secure smartphones have been in the news. One is
called the Blackphone. The other is called the Black phone. The difference in
their names is a space. Here's what we know about the two most secure
smartphones ever created.
http://cwonline.computerworld.com/t/8868066/823929835/659305/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference ~~~~~~~~~~~~~~~~~~~~~
Register now: CSO Magazine's CSO40 Security Confab
On behalf of Bob Bragdon, Publisher of CSO magazine and CSOonline.com, CSO would
like to invite you to register for CSO Magazine's spring 2014 conference – CSO40
Security Confab + Awards, being held March 31 – April 2, 2014 outside Atlanta,
Georgia.
http://cwonline.computerworld.com/t/8868066/823929835/649203/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Gameover malware is tougher to kill with new rootkit component
http://cwonline.computerworld.com/t/8868066/823929835/659306/19/
2. Bitcoin malware count soars as cryptocurrency value climbs
http://cwonline.computerworld.com/t/8868066/823929835/659307/20/
3. Stephen Colbert pitches own security solution at RSA Conference
http://cwonline.computerworld.com/t/8868066/823929835/659308/21/
4. Everything You Know About Enterprise Security Is Wrong
http://cwonline.computerworld.com/t/8868066/823929835/659309/28/
5. Mobile app for RSA Conference exposes personal data
http://cwonline.computerworld.com/t/8868066/823929835/659310/29/
6. Jaikumar Vijayan: Booze, bots and other RSA ruminations
http://cwonline.computerworld.com/t/8868066/823929835/659311/30/
7. Bug bounty operator presses vendors to pick up patching pace
http://cwonline.computerworld.com/t/8868066/823929835/659312/31/
8. Sears finds no evidence of data breach -- yet
http://cwonline.computerworld.com/t/8868066/823929835/659313/32/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Kaspersky~~~~~~~~~~~~~~~~~~~~~
IT Security by the Numbers: Calculating the TCP
Humorist Franklin P. Jones may have said it best: "When you get something for
nothing, you just haven't been billed for it yet." These are wise words of
warning for businesses counting on so-called "free" IT security software.
http://cwonline.computerworld.com/t/8868066/823929835/659314/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e03a83c6
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Gameover malware is tougher to kill with new rootkit component
A new variant of the Gameover malware that steals online banking credentials
comes with a kernel-level rootkit that makes it significantly harder to remove,
according to security researchers from Sophos.
http://cwonline.computerworld.com/t/8868066/823929835/659306/34/
Bitcoin malware count soars as cryptocurrency value climbs
As bitcoin values jumped in the last months of 2013, malware designed to steal
the virtual currency exploded, security researchers from Dell SecureWorks said
this week.
http://cwonline.computerworld.com/t/8868066/823929835/659307/35/
Stephen Colbert pitches own security solution at RSA Conference
Stephen Colbert's pitch for new data security company "Cloud Fog" and other
highlights from RSA Conference keynote in San Francisco.
http://cwonline.computerworld.com/t/8868066/823929835/659308/36/
Everything You Know About Enterprise Security Is Wrong
Whether you're talking about your network, your company's building or your home,
a perimeter approach to security is no longer adequate. As McAfee discussed at
this week's RSA Conference, you can't provide physical or electronic security
simply by trying to prevent authorized access -- you have to rethink all types
to security to protect data and lives.
http://cwonline.computerworld.com/t/8868066/823929835/659309/37/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: IBM Corporation~~~~~~~~~~~~~~~~~~~~~
Extreme Warehouse Speed for Fast Business Decisions
Informix ebook highlighting benefits of making decisions 'at the speed of
business'; and discusses optimizing warehouse performance; and simplifying
resources
http://cwonline.computerworld.com/t/8868066/823929835/659315/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=813306d3
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Mobile app for RSA Conference exposes personal data
A mobile application designed to make it easier for RSA Conference 2014
attendees to navigate the event and interact with their peers exposes personal
information, according to researchers from security firm IOActive.
http://cwonline.computerworld.com/t/8868066/823929835/659310/39/
Jaikumar Vijayan: Booze, bots and other RSA ruminations
SAN FRANCISO -- Dan Kaminsky looks like he could really use some rest. "Long
day?" I ask him. He shrugs. It's been a long several days, weeks, and months, he
says as we trudge our way to a table in the south foyer of San Francisco's
Moscone Center to talk about White Ops, a company he helped found.
http://cwonline.computerworld.com/t/8868066/823929835/659311/40/
Bug bounty operator presses vendors to pick up patching pace
Citing the need to prod software vendors to patch vulnerabilities even faster,
Hewlett-Packard's bug bounty program said it was shortening its
patch-or-go-public policy to 120 days.
http://cwonline.computerworld.com/t/8868066/823929835/659312/41/
Sears finds no evidence of data breach -- yet
Sears Holdings said a review of its systems does not show evidence yet of a data
breach as retailers continue to stay on guard in the light of payment card
terminal hacking at Target and Neiman Marcus.
http://cwonline.computerworld.com/t/8868066/823929835/659313/42/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/8868066/823929835/641183/43/
DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we chronicle how Android is exploding in the enterprise,
document how mobile device management is morphing to meet new demands, reflect
on the ways Google has developed into a surprisingly powerful ecosystem for end
users, and share observations on BYOD's role in spawning a new army of empowered
workers. This free, 28-page magazine-style report is available now.
[Registration required]
To read the report, click here:
http://cwonline.computerworld.com/t/8868066/823929835/643300/44/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8868066/823929835/604375/45/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8868066/823929835/598565/46/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
As wearable computers begin to monitor our activity and health even more, they
will essentially act as a sixth sense. What is the first wearable computer you
will buy?
http://cwonline.computerworld.com/t/8868066/823929835/659292/47/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8868066/823929835/156832/48/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8868066/823929835/311619/49/
Facebook: http://cwonline.computerworld.com/t/8868066/823929835/311620/50/
Twitter: http://cwonline.computerworld.com/t/8868066/823929835/311621/51/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8868066/823929835/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODY4MDY2&x=53ece9c9
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8868066/823929835/72510/53/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8868066/823929835/231613/54/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8868066/823929835/72509/55/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Monday, March 3, 2014
Secure smartphones are nice, but not enough
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:26 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment