Computerworld Security: June 26, 2015
===============================================================
Scott McNealy's view on privacy: You still don't have any
One-time Sun Microsystems CEO Scott McNealy now considers governments the
biggest privacy threat on the horizon.
http://cwonline.computerworld.com/t/9214678/823929835/742898/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=4b0c0288
~~~~~~~~~~~~~~~~~~~WHITE PAPER: NopSec, Inc.~~~~~~~~~~~~~~~~~~~~~
Vulnerability Threat Management in 2015: A Look Ahead
This analyst white paper discusses the inefficiencies in current vulnerability
risk management practices and the emerging players transforming the technology
landscape. In addition, new ideas, opportunities and trends are explored that
could carry the market forward.
http://cwonline.computerworld.com/t/9214678/823929835/742899/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a869af61
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Trojan that hides inside images infects healthcare organizations
http://cwonline.computerworld.com/t/9214678/823929835/742900/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1990131a
2. Cisco warns of default SSH keys shipped in three products
http://cwonline.computerworld.com/t/9214678/823929835/742901/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ef4bbc21
3. Magento e-commerce platform targeted with sneaky code
http://cwonline.computerworld.com/t/9214678/823929835/742902/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f7cc5aec
4. IDG Contributor Network: Is your thermostat spying on you? Cyberthreats and the Internet of Things
http://cwonline.computerworld.com/t/9214678/823929835/742903/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=1dc74e80
5. IDG Contributor Network: Just how secure is that hotspot?
http://cwonline.computerworld.com/t/9214678/823929835/742904/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=4466ed6a
~~~~~~~~~~~~~~~~~~~WHITE PAPER: NopSec, Inc.~~~~~~~~~~~~~~~~~~~~~
Market Overview: Vulnerability Management
This new analyst report explores the key challenges to effective vulnerability
risk management, how technology integration is improving the vulnerability
management process, and the emerging solutions available to help organizations
move beyond scanning.
http://cwonline.computerworld.com/t/9214678/823929835/742905/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=74401abc
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Trojan that hides inside images infects healthcare organizations
A computer Trojan that hides its malicious code inside PNG image files counts
healthcare organizations in the U.S. among its primary targets.
http://cwonline.computerworld.com/t/9214678/823929835/742900/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ce58dc48
Cisco warns of default SSH keys shipped in three products
Cisco Systems released a patch for three products that shipped with default
encryption keys, posing a risk that an attacker with the keys could decrypt data
traffic.
http://cwonline.computerworld.com/t/9214678/823929835/742901/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d10e9528
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Damballa~~~~~~~~~~~~~~~~~~~~~
New Weapons Offer Hope Against Advanced Cyber Attacks
One of the most frightening things about modern cyber-attacks is that a breach
can remain undetected within networks for weeks, months or even years. This time
gives hackers the luxury of compromising more systems and extracting
information.
http://cwonline.computerworld.com/t/9214678/823929835/742906/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&3e076d18=am9uc2FuOThAZ21haWwuY29t&x=10b9c3c0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Magento e-commerce platform targeted with sneaky code
The attack code, inserted into Magento, neatly lifts payment card details,
according to Sucuri
http://cwonline.computerworld.com/t/9214678/823929835/742902/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2bf93fb9
IDG Contributor Network: Is your thermostat spying on you? Cyberthreats and the Internet of Things
The Internet of Things opens up a whole new world of interactions, but raises
the specter of a security nightmare. Classic security solutions fail when faced
with multitudes of devices running embedded software.
http://cwonline.computerworld.com/t/9214678/823929835/742903/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=23c45aa4
IDG Contributor Network: Just how secure is that hotspot?
Sure free Wi-Fi is convenient and cost-free, but what is the risk to my mobile
device and how do I fight back?
http://cwonline.computerworld.com/t/9214678/823929835/742904/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=da6bad33
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9214678/823929835/724679/37/
Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close June 30.
http://cwonline.computerworld.com/t/9214678/823929835/736669/38/
Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
here: http://cwonline.computerworld.com/t/9214678/823929835/738200/39/
Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9214678/823929835/741285/40/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9214678/823929835/641183/41/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9214678/823929835/689330/42/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9214678/823929835/689330/43/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9214678/823929835/156832/44/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9214678/823929835/311619/45/
Facebook: http://cwonline.computerworld.com/t/9214678/823929835/311620/46/
Twitter: http://cwonline.computerworld.com/t/9214678/823929835/311621/47/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9214678/823929835/131135/48/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MjE0Njc4&x=c09de8a1
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9214678/823929835/689329/49/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9214678/823929835/689329/50/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9214678/823929835/689331/51/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Friday, June 26, 2015
Scott McNealy's view on privacy: You still don't have any
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:52 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment