Wednesday, July 1, 2015

Fingerprint sensors on their way to more smartphones

Computerworld Security: Issues and Trends: July 01, 2015
===============================================================

Fingerprint sensors on their way to more smartphones

Fingerprint authentication will become more common on smartphones of all prices
as sensors get cheaper, and Google's integration of the technology in the next
version of Android will make it much easier for app developers and service
providers to make use of them.
http://cwonline.computerworld.com/t/9216852/823929840/743857/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=20f89963

~~~~~~~~~~~~~~~~~~~WHITE PAPER: iDashboards~~~~~~~~~~~~~~~~~~~~~

UND Eliminates Data Overload with iDashboards

Struggling with data overload from fact books and static reporting, UND sought a
solution that would be used internally and externally, pulling data from their
different systems, databases and spreadsheets. Read more to find out why staff
at UND are now more enthusiastic about looking at the data.

http://cwonline.computerworld.com/t/9216852/823929840/743858/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b149f51a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. 8 backup and security tips for frequent fliers
http://cwonline.computerworld.com/t/9216852/823929840/743859/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f97eaf5e

2. INSIDER: CSO salaries rise fastest in New York, Boston
http://cwonline.computerworld.com/t/9216852/823929840/743860/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ada75194

3. The one-minute security manager
http://cwonline.computerworld.com/t/9216852/823929840/743861/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=11623547

4. INSIDER: 10 terrifying extreme hacks
http://cwonline.computerworld.com/t/9216852/823929840/743862/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f25d8e0b

5. INSIDER: IoT is the password killer we've been waiting for
http://cwonline.computerworld.com/t/9216852/823929840/743863/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d67771e4

6. 6 reasons why there will be another OPM-style hack
http://cwonline.computerworld.com/t/9216852/823929840/743864/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=90a12d7d

7. INSIDER: Review: New approaches to endpoint security
http://cwonline.computerworld.com/t/9216852/823929840/743865/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2e766f27

8. Software developers aren't implementing encryption correctly
http://cwonline.computerworld.com/t/9216852/823929840/743866/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=9e169613

9. INSIDER: Macros big again with cybercriminals
http://cwonline.computerworld.com/t/9216852/823929840/743867/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5175c0c3

10. Opinion: Linksys Smart Wi-Fi makes a stupid Guest network
http://cwonline.computerworld.com/t/9216852/823929840/743868/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d6d9c312

11. Just how secure is that hotspot?
http://cwonline.computerworld.com/t/9216852/823929840/743869/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=865707d6

12. INSIDER: Review: The best password managers for PCs, Macs, and mobile devices
http://cwonline.computerworld.com/t/9216852/823929840/743870/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6ccc983b

13. INSIDER: Banks get attacked four times more than other industries
http://cwonline.computerworld.com/t/9216852/823929840/743871/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6a0f9a0e

14. The NetUSB router flaw, Part 2: Detection and mitigation
http://cwonline.computerworld.com/t/9216852/823929840/743872/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=8dec5e93

15. INSIDER: Phishers target middle management
http://cwonline.computerworld.com/t/9216852/823929840/743873/39/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=03dd66c2

16. How encryption keys could be stolen by your lunch
http://cwonline.computerworld.com/t/9216852/823929840/743874/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a6d8c607

17. INSIDER: Agencies need to pay more attention to supply chain security
http://cwonline.computerworld.com/t/9216852/823929840/743875/41/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=378a2551


~~~~~~~~~~~~~~~~~~~WEBCAST: Nutanix~~~~~~~~~~~~~~~~~~~~~

Evolution of Flash in the Datacenter

Driven by trends of virtualization and cloud computing, storage requirements
have significantly changed in last few years. The question is no longer about
the need for flash, but how best to use flash to meet today's and future
applications needs.

http://cwonline.computerworld.com/t/9216852/823929840/743876/42/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fbf4586d

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

8 backup and security tips for frequent fliers

Do your data security plans include recovery contingencies for when you're
traveling?
http://cwonline.computerworld.com/t/9216852/823929840/743859/43/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5dcbc5e1

INSIDER: CSO salaries rise fastest in New York, Boston

The average CSO salary is now 4% higher than last year as a result of more
responsibility and better visibility, with salaries in New York and Boston
rising even faster, according to a new report. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/9216852/823929840/743860/44/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f9633885

The one-minute security manager

Many organizations today do not feel that they can afford to have a dedicated
information security manager or analyst. This responsibility often falls to an
existing staff member with other responsibilities. While far from ideal, it is
possible to have some impact on your security posture when it is not your
full-time focus. From the IDG Contributor Network.
http://cwonline.computerworld.com/t/9216852/823929840/743861/45/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6729f86c

INSIDER: 10 terrifying extreme hacks

Truly innovative or thought-provoking hacks are few and far between, but these
extreme hacks have earned the grudging respect of security experts. (Insider -
free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743862/46/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a1e3c43a

INSIDER: IoT is the password killer we've been waiting for

IoT, with its tiny screens and headless devices, will drive an authentication
revolution. It's a short leap from the kind of two-factor authentication used on
the Apple Watch to proximity-based authentication that does away with any user
interaction. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743863/47/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e507755d

6 reasons why there will be another OPM-style hack

Congress might fume about the security failures, but the truth is that it's part
of the problem.
http://cwonline.computerworld.com/t/9216852/823929840/743864/48/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=406ebf6c

INSIDER: Review: New approaches to endpoint security

In our recent roundup of anti-virus programs, we discovered several new
techniques being employed by anti-virus companies to make PCs safer against
advanced threats. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743865/49/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c5ded7e9

Software developers aren't implementing encryption correctly

Despite a big push to use encryption to fight security breaches, lack of
expertise among developers and overly complex libraries have led to widespread
implementation failures.
http://cwonline.computerworld.com/t/9216852/823929840/743866/50/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b6eb00d8

~~~~~~~~~~~~~~~~~~~WEBCAST: Alcatel-Lucent USA Inc.~~~~~~~~~~~~~~~~~~~~~

Digital Financial Transactions Flying High in the Clouds

This webinar reviews cloud infrastructure trends and solutions for the financial
services industry.

http://cwonline.computerworld.com/t/9216852/823929840/743877/51/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=99e14357

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

INSIDER: Macros big again with cybercriminals

Up to a year ago, most phishing emails were all about tricking users into
clicking on malicious links that led to malware downloads. Starting last fall,
however, the use of attachments increased eight-fold, and that increase has
persisted to this day, according to a new report. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/9216852/823929840/743867/52/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e2b98016

Opinion: Linksys Smart Wi-Fi makes a stupid Guest network

A recent article pointed out that Linksys and Belkin routers are incapable of
offering over-the-air encryption (WEP, WPA or WPA2) on their Guest wireless
networks. On top of this, their Guest networks use a captive portal, which is
confusing at best. I verified these problems and found even more issues with the
Guest network created by a Linksys Smart WiFi router.
http://cwonline.computerworld.com/t/9216852/823929840/743868/53/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b0962523

Just how secure is that hotspot?

Sure free Wi-Fi is convenient and cost-free, but what is the risk to my mobile
device and how do I fight back? From the IDG Contributor Network.
http://cwonline.computerworld.com/t/9216852/823929840/743869/54/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b6b428bf

INSIDER: Review: The best password managers for PCs, Macs, and mobile devices

10 local and cloud-based contenders make passwords stronger and online life
easier for Windows, OS X, iOS, Android, BlackBerry and Windows Phone users.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743870/55/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=eb7d6af6

INSIDER: Banks get attacked four times more than other industries

According to a new report from Websense Security Labs, the average number of
attacks against financial services institutions is four times higher than that
of companies in other industries. In addition, a third of all initial-stage
reconnaissance attacks target financial institutions. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743871/56/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=92c968cc

The NetUSB router flaw, Part 2: Detection and mitigation

Without a comprehensive list of routers vulnerable to the NetUSB flaw, the
burden falls on us to test our routers. This requires scanning for port 20005 on
the LAN side, for sure, and possibly the WAN side too. Here I describe scanning
for open TCP/IP LAN side ports using Windows, OS X and Android.
http://cwonline.computerworld.com/t/9216852/823929840/743872/57/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=eb660237

INSIDER: Phishers target middle management

Phishing scammers have busy middle managers in the crosshairs. Here's how to
avoid being a victim. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743873/58/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a4e6dedd

How encryption keys could be stolen by your lunch

A device, hidden in pita bread, can collect signals that can betray encryption
keys.
http://cwonline.computerworld.com/t/9216852/823929840/743874/59/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3d0909da

INSIDER: Agencies need to pay more attention to supply chain security

Government agencies seeking the lowest bidders typically overlook cybersecurity
when awarding contracts, and data breaches are the result. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743875/60/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2f53243c



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9216852/823929840/724679/61/


Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 14.
http://cwonline.computerworld.com/t/9216852/823929840/736669/62/


Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
here: http://cwonline.computerworld.com/t/9216852/823929840/738200/63/

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9216852/823929840/741285/64/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9216852/823929840/641183/65/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9216852/823929840/689330/66/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9216852/823929840/689330/67/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9216852/823929840/156832/68/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9216852/823929840/311619/69/

Facebook: http://cwonline.computerworld.com/t/9216852/823929840/311620/70/

Twitter: http://cwonline.computerworld.com/t/9216852/823929840/311621/130/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9216852/823929840/131135/131/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89OTIxNjg1Mg%3d%3d&x=de43c2fb

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9216852/823929840/689329/132/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9216852/823929840/689329/133/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9216852/823929840/689331/134/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:27 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive