CSO Salted Hash: May 26, 2015
===============================================================
CareFirst breach demonstrates how assumptions hurt healthcare
Last week, CareFirst BlueCross BlueShield (CareFirst) reported a data breach
that was initially discovered last year. When the incident was first noticed,
the company assumed they had taken care of the problem - only to learn that
wasn't the case ten months later.
http://cwonline.computerworld.com/t/9197972/823929835/736237/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7179153c
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Unitrends~~~~~~~~~~~~~~~~~~~~~
7 Shortcuts to Losing Your Data (and Probably Your Job!)
This tongue-in-cheek white paper explores data loss from a contrarian point of
view - exploring the top 7 shortcuts you can take to ensure that you lose your
data.
http://cwonline.computerworld.com/t/9197972/823929835/736238/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=0c7eee8e
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Attackers use email spam to infect point-of-sale terminals with new malware
http://cwonline.computerworld.com/t/9197972/823929835/736239/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e0d367f5
2. Do elected officials encrypt their email?
http://cwonline.computerworld.com/t/9197972/823929835/736240/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=39df8bad
3. The human cost of the Adult Friend Finder data breach
http://cwonline.computerworld.com/t/9197972/823929835/736241/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e808c492
4. My Notes On Northsec 2015
http://cwonline.computerworld.com/t/9197972/823929835/736242/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1698ea87
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Open Text~~~~~~~~~~~~~~~~~~~~~
Key business Drivers for Using B2B Outsourcing
With a clear understanding of B2B Managed Services, you can begin to address
whether your organization can benefit from this approach. Every organization is
different with different business priorities, trading communities and supply
chain strategies. However, some key business drivers for using Managed Services
have emerged.
http://cwonline.computerworld.com/t/9197972/823929835/736243/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=bd66166a
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Attackers use email spam to infect point-of-sale terminals with new malware
Cybercriminals are targeting employees who browse the Web or check their email
from point-of-sale (PoS) computers, a risky but unfortunately common practice.
http://cwonline.computerworld.com/t/9197972/823929835/736239/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e59db513
Do elected officials encrypt their email?
http://cwonline.computerworld.com/t/9197972/823929835/736240/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=cce4c861
~~~~~~~~~~~~~~~~~~~WEBCAST: Oracle~~~~~~~~~~~~~~~~~~~~~
Insight into Governance, Risk & Compliance Programs
Join us on Wednesday, May 6 at 2:00 p.m. EST for a live discussion with industry
experts.
http://cwonline.computerworld.com/t/9197972/823929835/736244/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=f971a1a4
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The human cost of the Adult Friend Finder data breach
http://cwonline.computerworld.com/t/9197972/823929835/736241/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=47742d1a
My Notes On Northsec 2015
http://cwonline.computerworld.com/t/9197972/823929835/736242/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=411c512f
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Editor's Picks
15 hot, new security and privacy apps for Android and iOS
http://cwonline.computerworld.com/t/9197972/823929835/736245/35/
How to get creative with your penetration testing
http://cwonline.computerworld.com/t/9197972/823929835/736246/36/
5 security bolstering strategies that won't break the bank
http://cwonline.computerworld.com/t/9197972/823929835/736247/37/
What's wrong with this picture? The NEW clean desk test
http://cwonline.computerworld.com/t/9197972/823929835/736248/38/
Inside an attack by the Syrian Electronic Army
http://cwonline.computerworld.com/t/9197972/823929835/736249/39/
Get more CSO peer perspective online:
LinkedIn
http://cwonline.computerworld.com/t/9197972/823929835/333259/40/
Facebook
http://cwonline.computerworld.com/t/9197972/823929835/333260/41/
Twitter
http://cwonline.computerworld.com/t/9197972/823929835/736250/42/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as jonsan98@gmail.com.
To unsubscribe from this newsletter, go to: http://cwonline.computerworld.com/t/9197972/823929835/131135/43/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MTk3OTcy&x=e8ec911b
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9197972/823929835/736251/44/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9197972/823929835/736252/45/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
CSOonline.com's online privacy policy is at:
http://cwonline.computerworld.com/t/9197972/823929835/732895/46/
If you are interested in advertising in this newsletter, please contact:
bglynn@cxo.com
To contact CSO Online, please send an e-mail to online@cxo.com.
Copyright (C) 2015 CSO Online, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone
directly, send an e-mail to online@cxo.com **
Tuesday, May 26, 2015
Large-scale attack uses browsers to hijack routers
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:31 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment