Monday, June 30, 2014

Selfmite worm targets Android devices

Computerworld Security: June 30, 2014
===============================================================

Selfmite worm targets Android devices

A rare Android worm that propagates itself to other users via links in text
messages has been discovered by security researchers.
http://cwonline.computerworld.com/t/8956751/823929835/678344/17/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Randstad Technologies~~~~~~~~~~~~~~~~~~~~~

2014 IT Workplace Trends and Salary Guide

Staying competitive in the IT market can be challenging. This guide provides you
with insight into variety of IT workplace trends including, U.S. salary data
by region and job title.

http://cwonline.computerworld.com/t/8956751/823929835/678345/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=175a6877

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. How to protect yourself against privileged user abuse
http://cwonline.computerworld.com/t/8956751/823929835/678346/19/

2. Facebook moves to recover user data seized by New York
http://cwonline.computerworld.com/t/8956751/823929835/678347/20/

3. Groups pressure U.S. lawmakers with NSA surveillance scorecard
http://cwonline.computerworld.com/t/8956751/823929835/678348/21/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Medhost~~~~~~~~~~~~~~~~~~~~~

Patient Portals: Connecting Communities of Care

Connecting patient health data across the care continuum is essential to achieve
improved care, increased access to personal health records and lowered costs. A
successful approach rests in having the hospital serve as the connectivity hub
for bringing patients, care givers and healthcare professionals together in a
secure, online environment.

http://cwonline.computerworld.com/t/8956751/823929835/678349/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=99f76b8a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

How to protect yourself against privileged user abuse

The typical organization loses 5% of its revenues to fraud by its own employees
each year, with most thefts committed by trusted employees in executive
management, operations, accounting, sales, customer service or purchasing,
according to the Association of Certified Fraud Examiners (ACFE). This type of
malicious behavior by "privileged users" who have been given broad access to the
company's computer assets has captured the attention of CIOs across the country.
http://cwonline.computerworld.com/t/8956751/823929835/678346/29/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Sophos, Inc.~~~~~~~~~~~~~~~~~~~~~

Endpoint Buyer's Guide

Evaluating the many components that make up an endpoint security solution may
seem overwhelming. Get independent research and test results to help you
determine your requirements and identify the vendor that best meets your needs.

http://cwonline.computerworld.com/t/8956751/823929835/678350/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=21a533c1

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Facebook moves to recover user data seized by New York

Facebook user data in bulk was sought last year by the New York County District
Attorney's office and a court directed it to produce virtually all records and
communications for 381 accounts, the company disclosed Thursday.
http://cwonline.computerworld.com/t/8956751/823929835/678347/31/

Groups pressure U.S. lawmakers with NSA surveillance scorecard

U.S. lawmakers got a report card on Friday: they've been graded by the
Electronic Frontier Foundation and other groups on whether they are effectively
reining in the National Security Agency's surveillance programs.
http://cwonline.computerworld.com/t/8956751/823929835/678348/32/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8956751/823929835/641183/33/


YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects,
including the immaturity of the tools, a lack of people with expertise in big
data technologies, the challenge of making the right investments and hardware
that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8956751/823929835/664231/34/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a772a637

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD

In our in-depth report, we look at the lessons learned from early adopters about
ramping up, scaling back and avoiding disasters in the cloud. We'll also tell
you why IT pros with cloud chops have seen their fortunes rise and offer tips on
how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration
required]
http://cwonline.computerworld.com/t/8956751/823929835/668561/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=1387d25b

INTERNET OF THINGS: GET THE LATEST!

Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/8956751/823929835/669786/36/


SUBSCRIBE TO COMPUTERWORLD DAILY NEWS

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/8956751/823929835/673015/37/


DIGITAL SPOTLIGHT: CONSUMERIZATION

Learn how four long-time BYOD implementers have changed their focus to keep up
with morphing requirements, especially with regards to locking down corporate
data.
http://cwonline.computerworld.com/t/8956751/823929835/675125/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e1d01ece

Computerworld's Premier 100 IT Leaders 2015

Computerworld has launched its annual search for technology professionals who
have demonstrated leadership in their organizations through the use of IT and
have the strategic vision to align technology with business goals.
Nominations are being collected now through Friday, July 18.
http://cwonline.computerworld.com/t/8956751/823929835/675126/39/
For more information about the program, please visit our website at:
http://cwonline.computerworld.com/t/8956751/823929835/567051/40/
Questions? Please email us at: Premier100@computerworld.com


KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION

Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.

Subscribe now:

http://cwonline.computerworld.com/t/8956751/823929835/604375/41/


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8956751/823929835/598565/42/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Android Wear, the 'L' operating system and Android auto -- those were just some
of the announcements from this year's Google I/O. Which do you think was most
important?

http://cwonline.computerworld.com/t/8956751/823929835/677964/43/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8956751/823929835/156832/44/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8956751/823929835/311619/45/

Facebook: http://cwonline.computerworld.com/t/8956751/823929835/311620/46/

Twitter: http://cwonline.computerworld.com/t/8956751/823929835/311621/47/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8956751/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTU2NzUx&x=27968049

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8956751/823929835/72510/49/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8956751/823929835/231613/50/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8956751/823929835/72509/51/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive