Computerworld Security: February 24, 2015
===============================================================
INSIDER: You've been hacked. Now what?
6 key things to do after a security breach.
http://cwonline.computerworld.com/t/9131994/823929835/720529/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=22fde6b1
~~~~~~~~~~~~~~~~~~~: Citrix Systems~~~~~~~~~~~~~~~~~~~~~
Security Leadership Series: Security Strategies for Success
Today's highly mobile employees and line-of-business groups are front-line
participants in the struggle to secure the enterprise. This exclusive CSO
Magazine eBook shares best practices for leading meaningful security
discussions, engaging users to protect business information, and meeting
security-related compliance requirements.
http://cwonline.computerworld.com/t/9131994/823929835/720530/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=590695ff
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Lenovo hit with lawsuit over Superfish snafu
http://cwonline.computerworld.com/t/9131994/823929835/720531/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=59837aa3
2. Using a router to block a modem
http://cwonline.computerworld.com/t/9131994/823929835/720532/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3afed72d
3. INSIDER: New weapons offer hope against advanced cyber-attacks
http://cwonline.computerworld.com/t/9131994/823929835/720533/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=423d1932
4. Chrome warns users of devious software that could impact Google's business
http://cwonline.computerworld.com/t/9131994/823929835/720534/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2d33f600
~~~~~~~~~~~~~~~~~~~WHITE PAPER: CDW~~~~~~~~~~~~~~~~~~~~~
The Most Complete Hyper-V Data Protection
CommVault Simpana 10 software's Virtual Server Agent (VSA) helps you gain new
efficiency out of your Hyper-V virtual infrastructure with the most advanced
Hyper-V backup/recovery and management solutions available today.
http://cwonline.computerworld.com/t/9131994/823929835/720535/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a8462bfc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Lenovo hit with lawsuit over Superfish snafu
Lenovo admitted to pre-loading the Superfish adware on some consumer PCs, and
unhappy customers are now dragging the company to court on the matter.
http://cwonline.computerworld.com/t/9131994/823929835/720531/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ae891eec
Using a router to block a modem
If your Internet connection consists of a separate router and modem, then a
private IP address, 192.168.100.1, may provide access to the modem. This can be
a double edged sword. Motorola SURFboard modems, in particular, can be reset and
rebooted by a malicious web page. A router configuration change should block
access to the modem.
http://cwonline.computerworld.com/t/9131994/823929835/720532/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ea9b389f
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Onapsis~~~~~~~~~~~~~~~~~~~~~
Building an Enterprise Application Security Program
In this research paper, Building an Enterprise Application Security program, we
will take a focused look at the major facets in an enterprise application
security program, and make practical suggestions on how to improve efficiency
and effectiveness of your security program.
http://cwonline.computerworld.com/t/9131994/823929835/720536/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=73a4136d
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
INSIDER: New weapons offer hope against advanced cyber-attacks
Traffic monitoring tools from Damballa, Lanscope, LightCyber can detect hidden
malware.
http://cwonline.computerworld.com/t/9131994/823929835/720533/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=87ffaa42
Chrome warns users of devious software that could impact Google's business
Google has added an early warning alert to Chrome that pops up when users try to
access a website that could try to dupe users into downloading underhanded
software.
http://cwonline.computerworld.com/t/9131994/823929835/720534/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3adbbb8f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Digital Spotlight: Mobile Security
Read how to make your workers smart about mobile security by moving beyond
policies and penalties and embracing an approach designed to identify and
correct specific problem behaviors. [Registration required]
http://cwonline.computerworld.com/t/9131994/823929835/693449/35/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=ffe61ff9
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT
practitioners about the technology, business opportunities and challenges you
face everyday. We invite you to participate by applying to be a contributor
today.
http://cwonline.computerworld.com/t/9131994/823929835/689530/36/
Computerworld's Digital Magazine
Computerworld's monthly Digital Magazine showcases articles, analysis and
commentary on important trends in enterprise IT, in core departments such as
News Analysis, Features, Opinions and Shark Tank. The new digital format offers
seamless navigation, with easy scrolling and zooming, and links to useful
related stories. The February edition is available now [Registration required]:
http://cwonline.computerworld.com/t/9131994/823929835/716670/37/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9131994/823929835/641183/38/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9131994/823929835/689330/39/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9131994/823929835/689330/40/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9131994/823929835/156832/41/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9131994/823929835/311619/42/
Facebook: http://cwonline.computerworld.com/t/9131994/823929835/311620/43/
Twitter: http://cwonline.computerworld.com/t/9131994/823929835/311621/44/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9131994/823929835/131135/45/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MTMxOTk0&x=a9b491a0
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9131994/823929835/689329/46/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9131994/823929835/689329/47/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9131994/823929835/689331/48/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Tuesday, February 24, 2015
Youve been hacked. Now what?
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:28 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment