Computerworld Security: December 19, 2014
===============================================================
Think North Korea hacked Sony? Think about this
North Korea or not? There's still a lot we don't know about the attack on Sony
Pictures and those behind it.
http://cwonline.computerworld.com/t/9087649/823929835/711513/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=08ab84f6
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Citrix Systems~~~~~~~~~~~~~~~~~~~~~
Getting Smart about Mobile Security
This report looks at how to make your workers smart about mobile security by
moving beyond policies and penalties and embracing an approach designed to
identify and correct specific problem behaviors. Also, we look at how
organizations can turn disruptive and clunky mobile security procedures into a
secure and seamless experience for end users.
http://cwonline.computerworld.com/t/9087649/823929835/711514/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0915cb67
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. The Sony breach may be start of new nation-state cyberattack
http://cwonline.computerworld.com/t/9087649/823929835/711515/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=59619213
2. Critical vulnerability in Git clients puts developers at risk
http://cwonline.computerworld.com/t/9087649/823929835/711516/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=fb327da2
3. Point-of-sale malware creators still in business with Spark
http://cwonline.computerworld.com/t/9087649/823929835/711517/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=eb3b07c9
4. Chinese Android phone maker hides secret backdoor on its devices
http://cwonline.computerworld.com/t/9087649/823929835/711518/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6b313f8c
5. Snopes debunks Elf on the Shelf as NSA spy; Professor: Elf teaches kids spying is OK
http://cwonline.computerworld.com/t/9087649/823929835/711519/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3cf62eb2
6. The 'grinch' isn't a Linux vulnerability, Red Hat says
http://cwonline.computerworld.com/t/9087649/823929835/711520/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1bbc15b1
7. Driver's license app on a smartphone raises privacy issues
http://cwonline.computerworld.com/t/9087649/823929835/711521/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=71d0e6de
8. Vulnerability in embedded Web server exposes millions of routers to hacking
http://cwonline.computerworld.com/t/9087649/823929835/711522/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7a601414
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Akamai~~~~~~~~~~~~~~~~~~~~~
The Importance of Improving and Adapting Web Security
With so much depending on web site availability, Chief Security Officers are
considering new ways to be cost-effectively proactive and vigilant. This paper
looks at the challenges and options to web security deployment.
http://cwonline.computerworld.com/t/9087649/823929835/711523/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=eda7e619
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Sony breach may be start of new nation-state cyberattack
It has been an exceptional year for IT security breaches and part of an
escalating trend in destructive attacks, and it's going to get worse.
http://cwonline.computerworld.com/t/9087649/823929835/711515/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=89073718
Critical vulnerability in Git clients puts developers at risk
A critical vulnerability in client software used to interact with Git, a
distributed revision control system for managing source code repositories,
allows attackers to execute rogue commands on computers used by developers.
http://cwonline.computerworld.com/t/9087649/823929835/711516/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2331ced9
Point-of-sale malware creators still in business with Spark
The Spark malware program steals payment card data from compromised
point-of-sale (POS) systems and is likely a modification of the older Trojan
called Alina.
http://cwonline.computerworld.com/t/9087649/823929835/711517/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=bbaebf5b
Chinese Android phone maker hides secret backdoor on its devices
Chinese smartphone maker Coolpad has built an extensive "backdoor" into its
Android devices that can track users, serve them unwanted advertisements and
install unauthorized apps, a U.S. security firm alleged today
http://cwonline.computerworld.com/t/9087649/823929835/711518/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2df22801
~~~~~~~~~~~~~~~~~~~WHITE PAPER: SAS~~~~~~~~~~~~~~~~~~~~~
Data Visualization Vendor Checklist
Are you embarking on a data visualization vendor evaluation? The 21 questions in
this checklist, developed by the SMB Group, will help you to drive important
discussions among your selection committee members, to help you make a better,
more informed decision.
http://cwonline.computerworld.com/t/9087649/823929835/711524/38/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=8fbd08e5
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Snopes debunks Elf on the Shelf as NSA spy; Professor: Elf teaches kids spying is OK
Even as Snopes debunked the claim that Elf on the Shelf is spying for the NSA, a
digital technology professor claimed the elf is changing children's expectation
of privacy; it's teaching kids that it is "cool for the NSA to watch them, to
report back to the government."
http://cwonline.computerworld.com/t/9087649/823929835/711519/39/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=22efaacd
The 'grinch' isn't a Linux vulnerability, Red Hat says
The "grinch" Linux vulnerability cited by Alert Logic on Tuesday isn't a
vulnerability at all, Red Hat says.
http://cwonline.computerworld.com/t/9087649/823929835/711520/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=9804d41a
Driver's license app on a smartphone raises privacy issues
Iowa is poised to become the first state to offer a mobile app as an official
driver's license that can be displayed to police officers and security
personnel, but smartphones hold a lot more data than a plastic card.
http://cwonline.computerworld.com/t/9087649/823929835/711521/41/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1f031315
Vulnerability in embedded Web server exposes millions of routers to hacking
A serious vulnerability in an embedded Web server used by many router models
from different manufacturers allows remote attackers to take control of affected
devices over the Internet.
http://cwonline.computerworld.com/t/9087649/823929835/711522/42/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b8f284ba
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Digital Spotlight: Mobile Security
Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9087649/823929835/693449/43/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=df0d3a6f
Is your IT department a great place to work?
Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 22d annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 31, 2014:
http://cwonline.computerworld.com/t/9087649/823929835/701013/44/
Computerworld's Digital Magazine
Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The December edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9087649/823929835/708802/45/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9087649/823929835/641183/46/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9087649/823929835/689330/47/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9087649/823929835/689330/48/
Join the Computerworld conversation on Google+
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/9087649/823929835/598565/49/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9087649/823929835/156832/50/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9087649/823929835/311619/51/
Facebook: http://cwonline.computerworld.com/t/9087649/823929835/311620/52/
Twitter: http://cwonline.computerworld.com/t/9087649/823929835/311621/53/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9087649/823929835/131135/54/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MDg3NjQ5&x=2d0ff8d9
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9087649/823929835/689329/55/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9087649/823929835/689329/56/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9087649/823929835/689331/57/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, December 19, 2014
Think North Korea hacked Sony? Think about this
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:43 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment