Wednesday, December 24, 2014

6 simple tricks for protecting your passwords

Computerworld Security: December 24, 2014
===============================================================

INSIDER: 6 simple tricks for protecting your passwords

We all know that the current username-and-password system is broken. With
Russian hackers reportedly sitting on over a billion passwords, and new breaches
hitting the news on a regular basis, it's fair to assume that if hackers don't
have your password already, they're about to.
http://cwonline.computerworld.com/t/9091246/823929835/712200/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d734a4de

~~~~~~~~~~~~~~~~~~~: Venafi~~~~~~~~~~~~~~~~~~~~~

Gaps In SSH Security Create An Open Door For Attackers

As an IT security leader, are you on top of SSH security for your organization?
It's key to next-generation trust protection. Find out what Forrester reveals
as gaps in that security—gaps that could put your organization in peril.

http://cwonline.computerworld.com/t/9091246/823929835/712201/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=83c3bdc8

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. US lawmaker asks Sony for details on data breach
http://cwonline.computerworld.com/t/9091246/823929835/712202/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e7309e93

2. Apple deploys first-ever automatic patch to fix NTP flaw
http://cwonline.computerworld.com/t/9091246/823929835/712203/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=18a2d208

3. Cybercrime group steals millions from Russian banks, targets US and European retailers
http://cwonline.computerworld.com/t/9091246/823929835/712204/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d7a37281

4. Exploits for dangerous network time protocol vulnerabilities can compromise systems
http://cwonline.computerworld.com/t/9091246/823929835/712205/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=520be09c

5. Cyberwarfare: Digital weapons causing physical damage
http://cwonline.computerworld.com/t/9091246/823929835/712206/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2c37209a

6. PATCH NOW: NTP vulns remotely exploitable. Sploits in wild already
http://cwonline.computerworld.com/t/9091246/823929835/712207/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=355c4c5a

7. China is key to North Korean Internet, but maybe not hackers
http://cwonline.computerworld.com/t/9091246/823929835/712208/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a6b4b33e

8. Thunderbolt devices can infect MacBooks with persistent rootkits
http://cwonline.computerworld.com/t/9091246/823929835/712209/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a88d89f2

9. Ireland wants US to use treaty to access Microsoft held emails
http://cwonline.computerworld.com/t/9091246/823929835/712210/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=4d861e05


~~~~~~~~~~~~~~~~~~~WEBCAST: IBM Corporation~~~~~~~~~~~~~~~~~~~~~

5 Ways Elastic Storage Provides Performance and Scalability

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM
Elastic Storage to improve the power of their voice recognition applications by
managing storage growth, cost and complexity while increasing performance.

http://cwonline.computerworld.com/t/9091246/823929835/712211/34/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=aac18839

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

US lawmaker asks Sony for details on data breach

A senior U.S. lawmaker wants Sony Pictures Entertainment to provide details
about its recent data breach and its cybersecurity practices, saying the
information will help Congress decide whether new laws are needed.
http://cwonline.computerworld.com/t/9091246/823929835/712202/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=bdda5cdf

Apple deploys first-ever automatic patch to fix NTP flaw

Apple on Monday used an automatic security update mechanism for the first time
to deploy a fix for a critical vulnerability in NTP, or Network Time Protocol,
that was uncovered by a Google engineer.
http://cwonline.computerworld.com/t/9091246/823929835/712203/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f084803f

Cybercrime group steals millions from Russian banks, targets US and European retailers

A sophisticated group of cybercriminals has stolen more than $25 million by
hacking into the infrastructure of numerous financial institutions in Russia and
former Soviet Union countries, as well as into point-of-sale systems belonging
to U.S. and European retailers.
http://cwonline.computerworld.com/t/9091246/823929835/712204/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3ad59217

Exploits for dangerous network time protocol vulnerabilities can compromise systems

Systems administrators are urged to install critical patches that address remote
code execution flaws in NTP.
http://cwonline.computerworld.com/t/9091246/823929835/712205/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2241c3e1

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Akamai~~~~~~~~~~~~~~~~~~~~~

The Importance of Improving and Adapting Web Security

With so much depending on web site availability, Chief Security Officers are
considering new ways to be cost-effectively proactive and vigilant. This paper
looks at the challenges and options to web security deployment.

http://cwonline.computerworld.com/t/9091246/823929835/712212/39/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f5e92396

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyberwarfare: Digital weapons causing physical damage

While the attack on Sony is considered "unprecedented," it was not the worst
corporate hack in 2014. More records were stolen from JPMorgan, Home Depot and
even eBay. But details of two of the scariest cyberattacks just hit the news in
December...and one of those -- about pipeline explosion -- has been a secret
since 2008. The other involves a digital attack on a German steel factory that
resulted in 'massive damage.'
http://cwonline.computerworld.com/t/9091246/823929835/712206/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e9e2fd2c

PATCH NOW: NTP vulns remotely exploitable. Sploits in wild already

Sky falling: Film at 11. The network time protocol (NTP) is badly vulnerable
(again). Time to get patching. But this won't be a simple matter for many IT
shops. Not great timing if you're winding down for the holidays, is it? In IT
Blogwatch, bloggers get ready to patch loads of gear.
http://cwonline.computerworld.com/t/9091246/823929835/712207/41/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=16535d0a

China is key to North Korean Internet, but maybe not hackers

A request to the Chinese government by U.S. diplomats to help crack down on
North Korean hacking underlines the important role that China plays in keeping
the dictatorship online.
http://cwonline.computerworld.com/t/9091246/823929835/712208/42/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f4d06757

Thunderbolt devices can infect MacBooks with persistent rootkits

The rogue code will run in the boot ROM and will be hard to detect or remove, a
researcher said.
http://cwonline.computerworld.com/t/9091246/823929835/712209/43/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=584a2bae

Ireland wants US to use treaty to access Microsoft held emails

"Respect Irish sovereignty," Ireland has told a court that is hearing a dispute
over access for U.S. law enforcement to email communications held by Microsoft
in Dublin.
http://cwonline.computerworld.com/t/9091246/823929835/712210/44/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7fd26b4a



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Digital Spotlight: Mobile Security

Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9091246/823929835/693449/45/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3f342453

Is your IT department a great place to work?

Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 22d annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 31, 2014:
http://cwonline.computerworld.com/t/9091246/823929835/701013/46/

Computerworld's Digital Magazine

Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The December edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9091246/823929835/708802/47/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9091246/823929835/641183/48/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9091246/823929835/689330/49/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9091246/823929835/689330/50/

Join the Computerworld conversation on Google+

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/9091246/823929835/598565/51/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9091246/823929835/156832/52/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9091246/823929835/311619/53/

Facebook: http://cwonline.computerworld.com/t/9091246/823929835/311620/54/

Twitter: http://cwonline.computerworld.com/t/9091246/823929835/311621/55/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9091246/823929835/131135/56/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MDkxMjQ2&x=02296b54

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9091246/823929835/689329/57/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9091246/823929835/689329/58/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9091246/823929835/689331/59/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:44 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive