Tuesday, December 23, 2014

Garden-variety DDoS attack knocks North Korea off the Internet

Computerworld Security: December 23, 2014
===============================================================

Garden-variety DDoS attack knocks North Korea off the Internet

The simplest explanation for North Korea's suddenly dropping off the Internet on
Monday was a distributed denial-of-service attack that overwhelmed the isolated
nation's tenuous connection to the rest of the world, experts said.
http://cwonline.computerworld.com/t/9090265/823929835/712002/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a3465157

~~~~~~~~~~~~~~~~~~~: Venafi~~~~~~~~~~~~~~~~~~~~~

Get Ready for PCI DSS v3 Deadlines

Are you prepared for PCI DSS v3? The standard demands that IT security leaders
have more visibility and security over keys and certificates. Find out what you
need to know about next-generation trust protection to lock down your mobile
environment.

http://cwonline.computerworld.com/t/9090265/823929835/712003/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a1e6135d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Two-factor authentication oversight led to JPMorgan breach
http://cwonline.computerworld.com/t/9090265/823929835/712004/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=52342370

2. Trojan program based on ZeuS targets 150 banks, can hijack webcams
http://cwonline.computerworld.com/t/9090265/823929835/712005/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b821743c

3. Microsoft hits Windows tech support scammers with lawsuit
http://cwonline.computerworld.com/t/9090265/823929835/712006/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2e9a04b6

4. Google wants to turn browser signals of Web encryption upside down
http://cwonline.computerworld.com/t/9090265/823929835/712007/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c4f14227

5. Tor warns of possible disruption of network through server seizures
http://cwonline.computerworld.com/t/9090265/823929835/712008/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=398a4ec1

6. Sony wants Twitter to suspend account of user who posted leaked documents
http://cwonline.computerworld.com/t/9090265/823929835/712009/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=93dc0d50


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix Systems~~~~~~~~~~~~~~~~~~~~~

Getting Smart about Mobile Security

This report looks at how to make your workers smart about mobile security by
moving beyond policies and penalties and embracing an approach designed to
identify and correct specific problem behaviors. Also, we look at how
organizations can turn disruptive and clunky mobile security procedures into a
secure and seamless experience for end users.

http://cwonline.computerworld.com/t/9090265/823929835/712010/31/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=3aea2f4c

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Two-factor authentication oversight led to JPMorgan breach

The attackers who stole information about 83 million JPMorgan Chase customers
earlier this year gained a foothold on the company's network because a server
reportedly lacked two-factor authentication.
http://cwonline.computerworld.com/t/9090265/823929835/712004/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2a732c5e

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs,
researchers said
http://cwonline.computerworld.com/t/9090265/823929835/712005/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=770e4450

Microsoft hits Windows tech support scammers with lawsuit

Microsoft on Thursday sued two technical support companies, alleging that they
infringed numerous Microsoft trademarks and practiced false advertising as they
tricked consumers into paying for bogus help.The lawsuit was the first time
Microsoft turned to the courts to try to stem the flood of tech support scams
that swamp Windows users."Defendants have utilized the Microsoft trademarks and
service marks to enhance their credentials and confuse customers about their
affiliation with Microsoft," the complaint stated. "Defendants then use their
enhanced credibility to convince consumers that their personal computers are
infected with malware in order to sell them unnecessary technical support and
security services to clean their computers."To read this article in full or to
leave a comment, please click here
http://cwonline.computerworld.com/t/9090265/823929835/712006/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=39ca9bbc

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Akamai~~~~~~~~~~~~~~~~~~~~~

Web Security: Protecting The Heart Of Your Business

Much like your home needs electricity or water to make it habitable, companies
require the Internet for most of their business-critical functions. The
business risks of not being able to connect with customers over the Internet or
recovering from a data breach are significant.

http://cwonline.computerworld.com/t/9090265/823929835/712011/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=62c71bfe

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Google wants to turn browser signals of Web encryption upside down

Chrome security engineers have proposed that all websites that don't encrypt
traffic be marked as insecure by browsers.
http://cwonline.computerworld.com/t/9090265/823929835/712007/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=899b4e61

Tor warns of possible disruption of network through server seizures

The Tor project said it could face attempts to incapacitate its network in the
next few days through the seizure of specialized servers.
http://cwonline.computerworld.com/t/9090265/823929835/712008/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e58b9da4

Sony wants Twitter to suspend account of user who posted leaked documents

Sony has asked Twitter to suspend the account of a person who is alleged to have
posted internal company documents and information released by hackers.
http://cwonline.computerworld.com/t/9090265/823929835/712009/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=81b8a71b



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Digital Spotlight: Mobile Security

Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9090265/823929835/693449/39/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=80662e98

Is your IT department a great place to work?

Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 22d annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 31, 2014:
http://cwonline.computerworld.com/t/9090265/823929835/701013/40/

Computerworld's Digital Magazine

Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The December edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9090265/823929835/708802/41/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9090265/823929835/641183/42/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9090265/823929835/689330/43/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9090265/823929835/689330/44/

Join the Computerworld conversation on Google+

Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.

http://cwonline.computerworld.com/t/9090265/823929835/598565/45/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9090265/823929835/156832/46/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9090265/823929835/311619/47/

Facebook: http://cwonline.computerworld.com/t/9090265/823929835/311620/48/

Twitter: http://cwonline.computerworld.com/t/9090265/823929835/311621/49/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9090265/823929835/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MDkwMjY1&x=51034387

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9090265/823929835/689329/51/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9090265/823929835/689329/52/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9090265/823929835/689331/53/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:46 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive