Tuesday, April 1, 2014

Banks withdraw data breach claim against Target

Computerworld Security: April 01, 2014
===============================================================

Banks withdraw data breach claim against Target

Two banks that took legal action against Target over its recent data breach have
withdrawn their claims, apparently due to an erroneous allegation against a
security vendor also named in the suit.
http://cwonline.computerworld.com/t/8889567/823929835/664262/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference ~~~~~~~~~~~~~~~~~~~~~

FINAL DAYS to Register: CSO40 Security Confab + Awards

Please join us this March 31 – April 2, 2014 for CSO40 Security Confab + Awards.
Our program of fast-moving, rapid fire presentations delivered by leading CSO
and CISO thought leaders demonstrate how forward-thinking organizations are
embracing today's challenges and preparing for the future.

http://cwonline.computerworld.com/t/8889567/823929835/649203/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. CryptoDefense ransomware leaves decryption key accessible
http://cwonline.computerworld.com/t/8889567/823929835/664263/19/

2. Darlene Storm: Untraceable $20 device can allow hacker to control a car 'from miles away'
http://cwonline.computerworld.com/t/8889567/823929835/664264/20/

3. INSIDER: Encrypting sensitive data is a must; new key management tools make it easy
http://cwonline.computerworld.com/t/8889567/823929835/664265/21/


~~~~~~~~~~~~~~~~~~~WEBCAST: Citrix~~~~~~~~~~~~~~~~~~~~~

LIVE EVENT, 4/15: Building Stakeholder Trust

FREE LIVE EVENT, 4/15: Building Stakeholder Trust
Join Paul Glen, award-winning author and Computerworld columnist, as he reveals
how to restore trust by improving perceptions of your IT services.

http://cwonline.computerworld.com/t/8889567/823929835/664266/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=720b367c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CryptoDefense ransomware leaves decryption key accessible

A malicious software program that encrypts a person's files until a ransom is
paid has a crucial error: it leaves the decryption key on the victim's computer.
http://cwonline.computerworld.com/t/8889567/823929835/664263/29/

~~~~~~~~~~~~~~~~~~~WEBCAST: Citrix~~~~~~~~~~~~~~~~~~~~~

Advance Your Career in Technology in One Simple Step

Watch this on-demand webinar with Paul Glen, award-winning author and
Computerworld columnist, as he reveals the one small adjustment you should make
today to yield huge career benefits.

http://cwonline.computerworld.com/t/8889567/823929835/664267/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=36ae1e9b

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: Untraceable $20 device can allow hacker to control a car 'from miles away'


A six-character password securing a Tesla Model S account was called a
potential security threat that might allow an attacker to unlock the doors, but
a scarier potential threat discussed at Black Hat Asia is a $20 'untraceable'
device that could allow an attacker to remotely take control of a car from
'miles away.'
http://cwonline.computerworld.com/t/8889567/823929835/664264/31/

INSIDER: Encrypting sensitive data is a must; new key management tools make it easy

Encryption is one of the best ways to prevent the type of terrible headaches
that many high-profile companies have experienced with stolen data. Even if
experienced hackers are able to penetrate a system, having the data encrypted
can mean that nothing useful is taken.
http://cwonline.computerworld.com/t/8889567/823929835/664265/32/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8889567/823929835/641183/33/


YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects,
including the immaturity of the tools, a lack of people with expertise in big
data technologies, the challenge of making the right investments and hardware
that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8889567/823929835/664231/34/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5e04b7ba

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8889567/823929835/604375/35/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8889567/823929835/598565/36/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Over the past year or so, smartphone innovation has hit a plateau. What do you
think phone makers should focus on to next to break the constraints of the
innovation curve?

http://cwonline.computerworld.com/t/8889567/823929835/663302/37/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8889567/823929835/156832/38/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8889567/823929835/311619/39/

Facebook: http://cwonline.computerworld.com/t/8889567/823929835/311620/40/

Twitter: http://cwonline.computerworld.com/t/8889567/823929835/311621/41/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8889567/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04ODg5NTY3&x=a306f8dc

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8889567/823929835/72510/43/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8889567/823929835/231613/44/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8889567/823929835/72509/45/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:02 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive