Computerworld Security: December 23, 2014
===============================================================
Garden-variety DDoS attack knocks North Korea off the Internet
The simplest explanation for North Korea's suddenly dropping off the Internet on
Monday was a distributed denial-of-service attack that overwhelmed the isolated
nation's tenuous connection to the rest of the world, experts said.
http://cwonline.computerworld.com/t/9090265/823929835/712002/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a3465157
~~~~~~~~~~~~~~~~~~~: Venafi~~~~~~~~~~~~~~~~~~~~~
Get Ready for PCI DSS v3 Deadlines
Are you prepared for PCI DSS v3? The standard demands that IT security leaders
have more visibility and security over keys and certificates. Find out what you
need to know about next-generation trust protection to lock down your mobile
environment.
http://cwonline.computerworld.com/t/9090265/823929835/712003/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a1e6135d
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Two-factor authentication oversight led to JPMorgan breach
http://cwonline.computerworld.com/t/9090265/823929835/712004/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=52342370
2. Trojan program based on ZeuS targets 150 banks, can hijack webcams
http://cwonline.computerworld.com/t/9090265/823929835/712005/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b821743c
3. Microsoft hits Windows tech support scammers with lawsuit
http://cwonline.computerworld.com/t/9090265/823929835/712006/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2e9a04b6
4. Google wants to turn browser signals of Web encryption upside down
http://cwonline.computerworld.com/t/9090265/823929835/712007/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c4f14227
5. Tor warns of possible disruption of network through server seizures
http://cwonline.computerworld.com/t/9090265/823929835/712008/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=398a4ec1
6. Sony wants Twitter to suspend account of user who posted leaked documents
http://cwonline.computerworld.com/t/9090265/823929835/712009/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=93dc0d50
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix Systems~~~~~~~~~~~~~~~~~~~~~
Getting Smart about Mobile Security
This report looks at how to make your workers smart about mobile security by
moving beyond policies and penalties and embracing an approach designed to
identify and correct specific problem behaviors. Also, we look at how
organizations can turn disruptive and clunky mobile security procedures into a
secure and seamless experience for end users.
http://cwonline.computerworld.com/t/9090265/823929835/712010/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3aea2f4c
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Two-factor authentication oversight led to JPMorgan breach
The attackers who stole information about 83 million JPMorgan Chase customers
earlier this year gained a foothold on the company's network because a server
reportedly lacked two-factor authentication.
http://cwonline.computerworld.com/t/9090265/823929835/712004/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2a732c5e
Trojan program based on ZeuS targets 150 banks, can hijack webcams
The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs,
researchers said
http://cwonline.computerworld.com/t/9090265/823929835/712005/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=770e4450
Microsoft hits Windows tech support scammers with lawsuit
Microsoft on Thursday sued two technical support companies, alleging that they
infringed numerous Microsoft trademarks and practiced false advertising as they
tricked consumers into paying for bogus help.The lawsuit was the first time
Microsoft turned to the courts to try to stem the flood of tech support scams
that swamp Windows users."Defendants have utilized the Microsoft trademarks and
service marks to enhance their credentials and confuse customers about their
affiliation with Microsoft," the complaint stated. "Defendants then use their
enhanced credibility to convince consumers that their personal computers are
infected with malware in order to sell them unnecessary technical support and
security services to clean their computers."To read this article in full or to
leave a comment, please click here
http://cwonline.computerworld.com/t/9090265/823929835/712006/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=39ca9bbc
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Akamai~~~~~~~~~~~~~~~~~~~~~
Web Security: Protecting The Heart Of Your Business
Much like your home needs electricity or water to make it habitable, companies
require the Internet for most of their business-critical functions. The
business risks of not being able to connect with customers over the Internet or
recovering from a data breach are significant.
http://cwonline.computerworld.com/t/9090265/823929835/712011/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=62c71bfe
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Google wants to turn browser signals of Web encryption upside down
Chrome security engineers have proposed that all websites that don't encrypt
traffic be marked as insecure by browsers.
http://cwonline.computerworld.com/t/9090265/823929835/712007/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=899b4e61
Tor warns of possible disruption of network through server seizures
The Tor project said it could face attempts to incapacitate its network in the
next few days through the seizure of specialized servers.
http://cwonline.computerworld.com/t/9090265/823929835/712008/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e58b9da4
Sony wants Twitter to suspend account of user who posted leaked documents
Sony has asked Twitter to suspend the account of a person who is alleged to have
posted internal company documents and information released by hackers.
http://cwonline.computerworld.com/t/9090265/823929835/712009/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=81b8a71b
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Digital Spotlight: Mobile Security
Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9090265/823929835/693449/39/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=80662e98
Is your IT department a great place to work?
Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 22d annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 31, 2014:
http://cwonline.computerworld.com/t/9090265/823929835/701013/40/
Computerworld's Digital Magazine
Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The December edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9090265/823929835/708802/41/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9090265/823929835/641183/42/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9090265/823929835/689330/43/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9090265/823929835/689330/44/
Join the Computerworld conversation on Google+
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/9090265/823929835/598565/45/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9090265/823929835/156832/46/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9090265/823929835/311619/47/
Facebook: http://cwonline.computerworld.com/t/9090265/823929835/311620/48/
Twitter: http://cwonline.computerworld.com/t/9090265/823929835/311621/49/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9090265/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MDkwMjY1&x=51034387
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9090265/823929835/689329/51/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9090265/823929835/689329/52/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9090265/823929835/689331/53/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, December 23, 2014
Garden-variety DDoS attack knocks North Korea off the Internet
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:46 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment