Wednesday, May 21, 2014

Silverlight malvertising exploits are on the rise

Computerworld Security: May 21, 2014
===============================================================

Silverlight malvertising exploits are on the rise

Microsoft Silverlight vulnerabilities are increasingly being exploited in
drive-by download attacks to infect computers with malware, especially through
malicious ads.
http://cwonline.computerworld.com/t/8926186/823929835/672191/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Polycom~~~~~~~~~~~~~~~~~~~~~

Remote Collaboration Challenges and Strategies to Overcome

Download this survey to learn what 5,000 business professionals around the world
say are their biggest collaboration challenges--and discover the strategies they
deploy to overcome them.

http://cwonline.computerworld.com/t/8926186/823929835/672192/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=50716653

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. AT&T hacker wants government to pay him $13M
http://cwonline.computerworld.com/t/8926186/823929835/672193/19/

2. Nicholas D. Evans: The importance of zero-trust and an adaptive perimeter in cyber fortifications
http://cwonline.computerworld.com/t/8926186/823929835/672194/20/

3. DOJ's charges against China reframe security, surveillance debate
http://cwonline.computerworld.com/t/8926186/823929835/672195/21/

4. China counters US claims with own charges of cyber-espionage
http://cwonline.computerworld.com/t/8926186/823929835/672196/28/

5. Symantec tailors sharper small business security suite
http://cwonline.computerworld.com/t/8926186/823929835/672197/29/

6. China retaliates, nixes Windows 8 on government PCs
http://cwonline.computerworld.com/t/8926186/823929835/672198/30/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Sophos, Inc.~~~~~~~~~~~~~~~~~~~~~

Advanced Persistent Threats: Detection and Protection

In this paper we'll explain how a multi-faceted approach to protect against APTs
including layers of defense can reduce the risk of attacks.

http://cwonline.computerworld.com/t/8926186/823929835/672199/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b668add2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

AT&T hacker wants government to pay him $13M

Andrew 'weev' Auernheimer, whose struggles with U.S. prosecutors have fueled
calls for reforming the Computer Fraud and Abuse Act, wants the government to
pay him $13 million for imprisoning him for the past three years.
http://cwonline.computerworld.com/t/8926186/823929835/672193/32/

Nicholas D. Evans: The importance of zero-trust and an adaptive perimeter in cyber fortifications


The cybersecurity world is at a crossroads in its evolution. In the same way
that concentric castles, with inner and outer walls, were built in response to
advances in siege technology, a new approach is required for cybersecurity due
to the evolving nature of today's threats. This new approach should
combine the existing tenets of "converged security" and
"defense-in-depth" with the new tenets of "zero trust"
and "adaptive perimeter".
http://cwonline.computerworld.com/t/8926186/823929835/672194/33/

DOJ's charges against China reframe security, surveillance debate

The U.S. Department of Justice's decision to bring computer hacking and economic
espionage charges against five alleged members of the Chinese army is an attempt
by President Barack Obama's administration to redirect a global discussion about
cyberhacking and surveillance, some cybersecurity experts said.
http://cwonline.computerworld.com/t/8926186/823929835/672195/34/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix~~~~~~~~~~~~~~~~~~~~~

Taking Your Enterprise Mobile: An Executive Checklist

This white paper from Citrix provides a checklist to follow to ensure your
company can embrace enterprise mobility securely.

http://cwonline.computerworld.com/t/8926186/823929835/672200/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2aa47760

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

China counters US claims with own charges of cyber-espionage

China's state-controlled media released Tuesday a report that claims the U.S.
hacked into Chinese systems using phishing attacks.
http://cwonline.computerworld.com/t/8926186/823929835/672196/36/

Symantec tailors sharper small business security suite

Symantec's latest product, Norton Small Business, is perhaps the most
well-rounded offering the company has inserted into its product array for small
companies.
http://cwonline.computerworld.com/t/8926186/823929835/672197/37/

China retaliates, nixes Windows 8 on government PCs

China has banned the use of Windows 8 on government computers, a move officials
there claimed was a reaction to the end of Windows XP's support.
http://cwonline.computerworld.com/t/8926186/823929835/672198/38/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8926186/823929835/641183/39/


YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects,
including the immaturity of the tools, a lack of people with expertise in big
data technologies, the challenge of making the right investments and hardware
that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8926186/823929835/664231/40/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7555c333

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD

In our in-depth report, we look at the lessons learned from early adopters about
ramping up, scaling back and avoiding disasters in the cloud. We'll also tell
you why IT pros with cloud chops have seen their fortunes rise and offer tips on
how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8926186/823929835/668561/41/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6377e94d

INTERNET OF THINGS: GET THE LATEST!

Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/8926186/823929835/669786/42/


KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8926186/823929835/604375/43/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8926186/823929835/598565/44/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

As the Internet of Things continues to take shape, what about it worries you
most?

http://cwonline.computerworld.com/t/8926186/823929835/670010/45/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8926186/823929835/156832/46/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8926186/823929835/311619/47/

Facebook: http://cwonline.computerworld.com/t/8926186/823929835/311620/48/

Twitter: http://cwonline.computerworld.com/t/8926186/823929835/311621/49/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8926186/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTI2MTg2&x=85e55eaf

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8926186/823929835/72510/51/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8926186/823929835/231613/52/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8926186/823929835/72509/53/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:58 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive