Thursday, June 19, 2014

NSA jitters are 'just a bummer' for cloud growth, HP says

Computerworld Security: June 19, 2014
===============================================================

NSA jitters are 'just a bummer' for cloud growth, HP says

Revelations about U.S. National Security Agency snooping have made some buyers
outside the U.S. think twice about public clouds, placing a drag on one of the
world's biggest technology trends, the head of Hewlett-Packard's enterprise
group said.
http://cwonline.computerworld.com/t/8947013/823929835/676760/17/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic, now part of Akamai~~~~~~~~~~~~~~~~~~~~~

Akamai Warns Fortune 500 of High-Risk Threat Zeus Crimeware

Attackers spread Zeus malware to acquire login credentials of target enterprises
and to build large botnets for cybercrime

http://cwonline.computerworld.com/t/8947013/823929835/676761/18/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Security holes could give hackers access to iOS, Android devices
http://cwonline.computerworld.com/t/8947013/823929835/676762/19/

2. LinkedIn called out on slow implementation of default SSL
http://cwonline.computerworld.com/t/8947013/823929835/676763/20/

3. Will full encryption sideline Google's targeted ads?
http://cwonline.computerworld.com/t/8947013/823929835/676764/21/

4. Six ways to prevent a breach like the one at AT&T
http://cwonline.computerworld.com/t/8947013/823929835/676765/28/

5. Europe to review personal data exchange between E.U. and U.S.
http://cwonline.computerworld.com/t/8947013/823929835/676766/29/

6. Darlene Storm: Forensic tool cracks into iCloud data with no password or Apple ID required
http://cwonline.computerworld.com/t/8947013/823929835/676767/30/

7. Bill to require warrant for email searches gains ground in House
http://cwonline.computerworld.com/t/8947013/823929835/676768/31/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Neustar Inc.~~~~~~~~~~~~~~~~~~~~~

Neustar 2014 DDoS Attacks and Impact Report

For the third consecutive year, Neustar surveyed hundreds of companies on
distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence
that the DDoS attack landscape is changing. The number of companies attacked is
up, but attack duration is down. Larger attacks are more common, but most
attacks are still less than 1 Gbps.

http://cwonline.computerworld.com/t/8947013/823929835/676769/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=156d4269

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Security holes could give hackers access to iOS, Android devices

Apple's tight vetting of mobile applications gives it a security edge over
Android, but there are still several ways for attackers to steal data from iOS
devices, a mobile security company warned in a report Tuesday.
http://cwonline.computerworld.com/t/8947013/823929835/676762/33/

LinkedIn called out on slow implementation of default SSL

LinkedIn said it is making progress implementing default encryption of data
exchanged with its users after a security company alleged some users are still
at risk of account takeovers.
http://cwonline.computerworld.com/t/8947013/823929835/676763/34/

Will full encryption sideline Google's targeted ads?

Mining personal data to deliver targeted ads is the lifeblood of Google's
business -- and of many other online firms. But what if that data dries up at
the source?
http://cwonline.computerworld.com/t/8947013/823929835/676764/35/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: SolarWinds~~~~~~~~~~~~~~~~~~~~~

Champagne SIEM on a Beer Budget

The SolarWinds Log & Event Manager is an excellent option for all sizes of
organizations wanting to increase the security of their networks by keeping an
eye on their security-related log data without breaking the bank.

http://cwonline.computerworld.com/t/8947013/823929835/676770/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3fee6bbc

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Six ways to prevent a breach like the one at AT&T

A data breach like the one recently reported by AT&T demonstrates that
security policies alone are only a paper tiger without the technological teeth
to make sure they are enforced, experts say.
http://cwonline.computerworld.com/t/8947013/823929835/676765/37/

Europe to review personal data exchange between E.U. and U.S.

The Irish High Court has referred to a 14-year-old agreement governing the
exchange of personal data between the European Union and the U.S. to the EU's
top court.
http://cwonline.computerworld.com/t/8947013/823929835/676766/38/

Darlene Storm: Forensic tool cracks into iCloud data with no password or Apple ID required


iCloud is pimped as a place to store any type of file and access it later from
any device, but remember to log out of iCloud Control Panel or the newest
edition of a forensic tool can access iCloud data without needing a password or
an Apple ID.
http://cwonline.computerworld.com/t/8947013/823929835/676767/39/

Bill to require warrant for email searches gains ground in House

A far-reaching bill that would require the government to obtain a warrant to
search through people's emails and other online communications now has majority
support in the House of Representatives.
http://cwonline.computerworld.com/t/8947013/823929835/676768/40/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8947013/823929835/641183/41/


YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects,
including the immaturity of the tools, a lack of people with expertise in big
data technologies, the challenge of making the right investments and hardware
that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8947013/823929835/664231/42/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=285b866a

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD

In our in-depth report, we look at the lessons learned from early adopters about
ramping up, scaling back and avoiding disasters in the cloud. We'll also tell
you why IT pros with cloud chops have seen their fortunes rise and offer tips on
how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8947013/823929835/668561/43/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0b781e1e

INTERNET OF THINGS: GET THE LATEST!

Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/8947013/823929835/669786/44/


SUBSCRIBE TO COMPUTERWORLD DAILY NEWS

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/8947013/823929835/673015/45/


DIGITAL SPOTLIGHT: CONSUMERIZATION

Learn how four long-time BYOD implementers have changed their focus to keep up
with morphing requirements, especially with regards to locking down corporate
data.
http://cwonline.computerworld.com/t/8947013/823929835/675125/46/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e2bd3091

Computerworld's Premier 100 IT Leaders 2015

Computerworld has launched its annual search for technology professionals who
have demonstrated leadership in their organizations through the use of IT and
have the strategic vision to align technology with business goals.
Nominations are being collected now through Friday, July 18.
http://cwonline.computerworld.com/t/8947013/823929835/675126/47/
For more information about the program, please visit our website at:
http://cwonline.computerworld.com/t/8947013/823929835/567051/48/
Questions? Please email us at: Premier100@computerworld.com


KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8947013/823929835/604375/49/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8947013/823929835/598565/50/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

It's been two months since Microsoft withdrew support for Windows XP, but the
aged OS has yet to be exploited by hackers. What's holding them back?

http://cwonline.computerworld.com/t/8947013/823929835/675279/51/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8947013/823929835/156832/52/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8947013/823929835/311619/53/

Facebook: http://cwonline.computerworld.com/t/8947013/823929835/311620/54/

Twitter: http://cwonline.computerworld.com/t/8947013/823929835/311621/55/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8947013/823929835/131135/56/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTQ3MDEz&x=23cc5c5c

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8947013/823929835/72510/57/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8947013/823929835/231613/58/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8947013/823929835/72509/59/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:16 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive