Tuesday, June 17, 2014

Powerful Dyreza banking malware emerges

Computerworld Security: June 17, 2014
===============================================================

Powerful Dyreza banking malware emerges

Security researchers said they've spotted a new type of banking malware that
rivals the capabilities of the infamous Zeus malware.
http://cwonline.computerworld.com/t/8945144/823929835/676378/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Neustar Inc.~~~~~~~~~~~~~~~~~~~~~

Neustar 2014 DDoS Attacks and Impact Report

For the third consecutive year, Neustar surveyed hundreds of companies on
distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence
that the DDoS attack landscape is changing. The number of companies attacked is
up, but attack duration is down. Larger attacks are more common, but most
attacks are still less than 1 Gbps.

http://cwonline.computerworld.com/t/8945144/823929835/676379/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=2e565b5f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Target top security officer reporting to CIO seen as a mistake
http://cwonline.computerworld.com/t/8945144/823929835/676380/19/

2. Richi Jennings: Intelligence firm Stratfor wasn't very smart about data security
http://cwonline.computerworld.com/t/8945144/823929835/676381/20/

3. Darlene Storm: No cloud privacy or security: If NSA wants your cloud data 'be big boys about it'
http://cwonline.computerworld.com/t/8945144/823929835/676382/21/

4. Hacked Synology NAS systems used in big-profit cryptocurrency mining scheme
http://cwonline.computerworld.com/t/8945144/823929835/676383/28/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Red Hat~~~~~~~~~~~~~~~~~~~~~

CIOs strive to harness Big Data, keeping an eye on ROI

Read this whitepaper to learn how Red Hat Storage Server allows CIOs to
confidently support business growth, manage cost and risk, capitalize on
emerging technologies, and drive future innovation across their organizations.

http://cwonline.computerworld.com/t/8945144/823929835/676384/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ac9ebbff

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Target top security officer reporting to CIO seen as a mistake

In hiring its first CISO to prevent another massive data breach, Target made a
mistake in not having the top security officer report directly to the chief
executive, experts say.
http://cwonline.computerworld.com/t/8945144/823929835/676380/30/

Richi Jennings: Intelligence firm Stratfor wasn't very smart about data security


Stratfor: Globally intelligent or universally stupid?

Stratfor is a secretive, shadowy, somewhat-scary company that refers to itself
as a "geopolitical intelligence and consulting firm." The company attracted
(unwanted) attention in 2011 for a website data breach, finding itself "pwned"
by hackivist group AntiSec, and highly embarrased to boot. The incident and
resulting data theft revealed details on hundreds of high-profile clients, all
of which were uploaded to data-leak haven Wikileaks.
http://cwonline.computerworld.com/t/8945144/823929835/676381/31/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: AVI-SPL~~~~~~~~~~~~~~~~~~~~~

The State of Video Conferencing Security

Video conferencing equipment, found in almost every boardroom around the world,
may be opening up companies to serious security breaches. This paper explains
how government entities can protect themselves.

http://cwonline.computerworld.com/t/8945144/823929835/676385/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=52ea4791

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Darlene Storm: No cloud privacy or security: If NSA wants your cloud data 'be big boys about it'


While one security expert argues that there's nothing to be done if an
intelligence agency is set on accessing your cloud data, instead 'be big boys
about it' and basically get over it, another expert urges you to add your voice
to the Digital Freedom Manifesto to help stop mass surveillance.
http://cwonline.computerworld.com/t/8945144/823929835/676382/33/

Hacked Synology NAS systems used in big-profit cryptocurrency mining scheme

A hacker exploited publicly known vulnerabilities to install malware on NAS
systems made by Synology and used their computing power to generate Dogecoins, a
type of cryptocurrency.
http://cwonline.computerworld.com/t/8945144/823929835/676383/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8945144/823929835/641183/35/


YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects,
including the immaturity of the tools, a lack of people with expertise in big
data technologies, the challenge of making the right investments and hardware
that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8945144/823929835/664231/36/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e0c40f37

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD

In our in-depth report, we look at the lessons learned from early adopters about
ramping up, scaling back and avoiding disasters in the cloud. We'll also tell
you why IT pros with cloud chops have seen their fortunes rise and offer tips on
how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8945144/823929835/668561/37/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=d53cf86d

INTERNET OF THINGS: GET THE LATEST!

Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/8945144/823929835/669786/38/


SUBSCRIBE TO COMPUTERWORLD DAILY NEWS

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/8945144/823929835/673015/39/


DIGITAL SPOTLIGHT: CONSUMERIZATION

Learn how four long-time BYOD implementers have changed their focus to keep up
with morphing requirements, especially with regards to locking down corporate
data.
http://cwonline.computerworld.com/t/8945144/823929835/675125/40/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=7b676887

Computerworld's Premier 100 IT Leaders 2015

Computerworld has launched its annual search for technology professionals who
have demonstrated leadership in their organizations through the use of IT and
have the strategic vision to align technology with business goals.
Nominations are being collected now through Friday, July 18.
http://cwonline.computerworld.com/t/8945144/823929835/675126/41/
For more information about the program, please visit our website at:
http://cwonline.computerworld.com/t/8945144/823929835/567051/42/
Questions? Please email us at: Premier100@computerworld.com


KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8945144/823929835/604375/43/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8945144/823929835/598565/44/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

It's been two months since Microsoft withdrew support for Windows XP, but the
aged OS has yet to be exploited by hackers. What's holding them back?

http://cwonline.computerworld.com/t/8945144/823929835/675279/45/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8945144/823929835/156832/46/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8945144/823929835/311619/47/

Facebook: http://cwonline.computerworld.com/t/8945144/823929835/311620/48/

Twitter: http://cwonline.computerworld.com/t/8945144/823929835/311621/49/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8945144/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTQ1MTQ0&x=56c2d070

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8945144/823929835/72510/51/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8945144/823929835/231613/52/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8945144/823929835/72509/53/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:22 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive