Computerworld Security: October 28, 2014
===============================================================
Tor Project flags Russian 'exit node' server for delivering malware
The Tor Project has flagged a server in Russia after a security researcher found
it slipped in malware when users were downloading files.
http://cwonline.computerworld.com/t/9052888/823929835/700883/17/
~~~~~~~~~~~~~~~~~~~WEBCAST: VEEAM Software~~~~~~~~~~~~~~~~~~~~~
Best Practices in Virtualized Protection for 2014
Jason Buffington, ESG Sr. Analyst, discusses ESG's research findings on
protecting highly virtualized environments, looking at such topics as:
- Server hypervisor adoption/preferences,
- General data protection trends,
- and specific approaches for protecting and recovering both VMware and Hyper-V
environments.
http://cwonline.computerworld.com/t/9052888/823929835/700884/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5c1ec42d
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Flaw in widely used 'strings' utility could spell trouble for malware analysts
http://cwonline.computerworld.com/t/9052888/823929835/700885/19/
2. Zero-day in Samsung 'Find My Mobile' service allows attacker to remotely lock phone
http://cwonline.computerworld.com/t/9052888/823929835/700886/20/
3. For big raises in IT, look to mobile, security, big data
http://cwonline.computerworld.com/t/9052888/823929835/700887/21/
4. Phone maker Xiaomi moves data outside China over privacy concerns
http://cwonline.computerworld.com/t/9052888/823929835/700888/28/
5. Facebook, Yahoo prevent use of recycled email addresses to hijack accounts
http://cwonline.computerworld.com/t/9052888/823929835/700889/29/
6. Cyberespionage group goes phishing for Outlook Web App users
http://cwonline.computerworld.com/t/9052888/823929835/700890/30/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix Systems~~~~~~~~~~~~~~~~~~~~~
Getting Smart about Mobile Security
This report looks at how to make your workers smart about mobile security by
moving beyond policies and penalties and embracing an approach designed to
identify and correct specific problem behaviors. Also, we look at how
organizations can turn disruptive and clunky mobile security procedures into a
secure and seamless experience for end users.
http://cwonline.computerworld.com/t/9052888/823929835/700891/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=5060f7bf
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Flaw in widely used 'strings' utility could spell trouble for malware analysts
One of the first things a malware analyst does with a suspicious executable file
is extract the text strings inside it, because they can provide immediate clues
about its purpose. But that move could actually lead to a system compromise.
http://cwonline.computerworld.com/t/9052888/823929835/700885/32/
Zero-day in Samsung 'Find My Mobile' service allows attacker to remotely lock phone
NIST warned that if an attacker exploits the zero-day vulnerability in Samsung's
'Find My Mobile' service, then the hacker can remotely lock, unlock and ring the
phone.
http://cwonline.computerworld.com/t/9052888/823929835/700886/33/
For big raises in IT, look to mobile, security, big data
IT salaries will remain mostly stagnant in 2015, except for workers with highly
coveted skill sets, according to a report tracking IT salaries and skills demand
in the coming years.
http://cwonline.computerworld.com/t/9052888/823929835/700887/34/
~~~~~~~~~~~~~~~~~~~: BMC Software~~~~~~~~~~~~~~~~~~~~~
Case Study: IT Data Analytics - BMC Software
BMC Software is not only a provider of IT management software but also a
consumer of that software. Learn how BMC IT uses BMC's TrueSight IT Data
Analytics to get to the root cause of an issue by automatically searching
multiple log files for errors or service disruptions.
http://cwonline.computerworld.com/t/9052888/823929835/700892/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3b1e17ed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Phone maker Xiaomi moves data outside China over privacy concerns
Chinese smartphone maker Xiaomi is moving customer data and its Internet
platforms to servers outside China, only months after the company apologized
over privacy concerns.
http://cwonline.computerworld.com/t/9052888/823929835/700888/36/
Facebook, Yahoo prevent use of recycled email addresses to hijack accounts
A new mechanism helps email servers determine if a message was intended for a
recycled account's previous owner
http://cwonline.computerworld.com/t/9052888/823929835/700889/37/
Cyberespionage group goes phishing for Outlook Web App users
A cyberespionage group is using advanced spear-phishing techniques to steal
email log-in credentials from military agencies, embassies, defense contractors
and media outlets that use Office 365's Outlook Web App.
http://cwonline.computerworld.com/t/9052888/823929835/700890/38/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: MOBILE SECURITY
Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9052888/823929835/693449/39/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=94817c12
TAKE OUR SALARY SURVEY!
Computerworld's 2015 Salary Survey: How will your salary compare with your IT
peers? Computerworld's 29th Annual Salary Survey will feature the latest IT
salary trends and advice on where to find the best-paying jobs. This year's
survey participants can enter a drawing to win one of 3 American Express gift
cards for $500 each! The drawing is open to legal U.S. residents, age 18 or
older.
Take our annual Salary Survey today! tinyurl.com/m9erxtl
COMPUTERWORLD DIGITAL MAGAZINE
Computerworld's new monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The October edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9052888/823929835/697637/40/
FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9052888/823929835/641183/41/
INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the
rapidly evolving technologies, trends and developments related to the Internet
of Things (IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9052888/823929835/689330/42/
SUBSCRIBE TO COMPUTERWORLD DAILY NEWS
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9052888/823929835/689330/43/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/9052888/823929835/598565/44/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Apple is releasing its first public beta of OS X Yosemite. Is that a smart move?
http://cwonline.computerworld.com/t/9052888/823929835/682409/45/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9052888/823929835/156832/46/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9052888/823929835/311619/47/
Facebook: http://cwonline.computerworld.com/t/9052888/823929835/311620/48/
Twitter: http://cwonline.computerworld.com/t/9052888/823929835/311621/49/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9052888/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MDUyODg4&x=0809f6d0
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9052888/823929835/689329/51/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9052888/823929835/689329/52/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9052888/823929835/689331/53/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, October 28, 2014
Tor Project flags Russian 'exit node' server for delivering malware
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:20 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment