Monday, August 4, 2014

Android vulnerability still a threat after nearly two years

Computerworld Security: August 04, 2014
===============================================================

Android vulnerability still a threat after nearly two years

Security researchers have recently found a vulnerability that could be used to
hijack Android apps and devices, but an older issue that can have the same
effect remains a significant threat nearly two years after its discovery,
according to security firm Bromium.
http://cwonline.computerworld.com/t/8987550/823929835/684270/17/

~~~~~~~~~~~~~~~~~~~WEBCAST: Cisco Systems~~~~~~~~~~~~~~~~~~~~~

Innovations that Protect Against Advanced Attackers

This webinar will explore new technologies and process for protecting endpoints
from advanced attackers and how innovations like continuous data collection
combined with big data analytics are pushing the envelope for what security
teams can do during and after an advanced attacker puts them in their sights.

http://cwonline.computerworld.com/t/8987550/823929835/684271/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c570de78

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. In search of a social site that doesn't lie
http://cwonline.computerworld.com/t/8987550/823929835/684272/19/

2. Richi Jennings: PANIC! USB insecure (it's ''fundamentally broken'') #BadUSB
http://cwonline.computerworld.com/t/8987550/823929835/684273/20/

3. Attackers can easily create dangerous file-encrypting malware, new threat suggests
http://cwonline.computerworld.com/t/8987550/823929835/684274/21/

4. Preston Gralla: Anti-privacy court ruling shows why Microsoft is one of privacy's best friends
http://cwonline.computerworld.com/t/8987550/823929835/684275/28/


~~~~~~~~~~~~~~~~~~~WEBCAST: Fortinet~~~~~~~~~~~~~~~~~~~~~

Why are customers really deploying an NGFW?

Next Generation Firewall (NGFW). It seems every IT Security expert is talking
about them, but what are people really doing? This webcast covers 5 real-world
customer deployments and explores business drivers, key requirements, solutions
considered and the final deployment.

http://cwonline.computerworld.com/t/8987550/823929835/684276/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=e69fe685

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

In search of a social site that doesn't lie

Mike Elgan would like to find a social network that doesn't lie to users,
doesn't experiment on users without their clear knowledge, and delivers by
default all the posts of the people they follow.
http://cwonline.computerworld.com/t/8987550/823929835/684272/30/

Richi Jennings: PANIC! USB insecure (it's ''fundamentally broken'') #BadUSB


BadUSB: Karsten Nohl and friends set up us the bomb.

USB gadgets are unsafe safe. That's the stark warning from Security Research
Labs, to be given at Black Hat in Lost Wages. Basically, any USB device can do
anything it wants to your PC or Mac, and there's nothing you can do to stop it,
detect it, or remediate it.

tl;dr: We're screwed. In IT Blogwatch, bloggers panic like it's 2038.
http://cwonline.computerworld.com/t/8987550/823929835/684273/31/

~~~~~~~~~~~~~~~~~~~: RMG Networks~~~~~~~~~~~~~~~~~~~~~

Visualizing Gamification with Intelligent Digital Signage

When designed and implemented correctly, gamification in business can help
businesses motivate performance and increase productivity. Learn More.

http://cwonline.computerworld.com/t/8987550/823929835/684277/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6a67ca27

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Attackers can easily create dangerous file-encrypting malware, new threat suggests

A new program that encrypts files to extort money from users highlights that
attackers don't need advanced programming skills to create dangerous and
effective ransomware threats, especially when strong encryption technology is
freely available.
http://cwonline.computerworld.com/t/8987550/823929835/684274/33/

Preston Gralla: Anti-privacy court ruling shows why Microsoft is one of privacy's best friends


If you're worried about your privacy, Microsoft is one of your best friends.
Microsoft's decision to appeal a court ruling that it has to turn over to the
federal government email stored in Ireland shows once again that the company is
fighting for your electronic privacy rights.
http://cwonline.computerworld.com/t/8987550/823929835/684275/34/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Computerworld Digital Magazine
Computerworld's new monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The August edition is available now [Registration required]:
http://cwonline.computerworld.com/t/8987550/823929835/684208/35/

FREE SHARK TANK T-SHIRT

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/8987550/823929835/641183/36/


INTERNET OF THINGS: GET THE LATEST!

Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/8987550/823929835/669786/37/


SUBSCRIBE TO COMPUTERWORLD DAILY NEWS

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/8987550/823929835/673015/38/


DIGITAL SPOTLIGHT: CONSUMERIZATION

Learn how four long-time BYOD implementers have changed their focus to keep up
with morphing requirements, especially with regards to locking down corporate
data.
http://cwonline.computerworld.com/t/8987550/823929835/675125/39/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5aec1bf4

Computerworld's Premier 100 IT Leaders 2015

Computerworld has launched its annual search for technology professionals who
have demonstrated leadership in their organizations through the use of IT and
have the strategic vision to align technology with business goals.
Nominations are being collected now through Friday, July 25.
http://cwonline.computerworld.com/t/8987550/823929835/675126/40/
For more information about the program, please visit our website at:
http://cwonline.computerworld.com/t/8987550/823929835/567051/41/
Questions? Please email us at: Premier100@computerworld.com


JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/8987550/823929835/598565/42/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Apple is releasing its first public beta of OS X Yosemite. Is that a smart move?

http://cwonline.computerworld.com/t/8987550/823929835/682409/43/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/8987550/823929835/156832/44/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/8987550/823929835/311619/45/

Facebook: http://cwonline.computerworld.com/t/8987550/823929835/311620/46/

Twitter: http://cwonline.computerworld.com/t/8987550/823929835/311621/47/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8987550/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04OTg3NTUw&x=adcd2d81

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8987550/823929835/72510/49/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8987550/823929835/231613/50/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8987550/823929835/72509/51/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:58 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive