Computerworld Security: Issues and Trends: July 01, 2015
===============================================================
Fingerprint sensors on their way to more smartphones
Fingerprint authentication will become more common on smartphones of all prices
as sensors get cheaper, and Google's integration of the technology in the next
version of Android will make it much easier for app developers and service
providers to make use of them.
http://cwonline.computerworld.com/t/9216852/823929840/743857/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=20f89963
~~~~~~~~~~~~~~~~~~~WHITE PAPER: iDashboards~~~~~~~~~~~~~~~~~~~~~
UND Eliminates Data Overload with iDashboards
Struggling with data overload from fact books and static reporting, UND sought a
solution that would be used internally and externally, pulling data from their
different systems, databases and spreadsheets. Read more to find out why staff
at UND are now more enthusiastic about looking at the data.
http://cwonline.computerworld.com/t/9216852/823929840/743858/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=b149f51a
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. 8 backup and security tips for frequent fliers
http://cwonline.computerworld.com/t/9216852/823929840/743859/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f97eaf5e
2. INSIDER: CSO salaries rise fastest in New York, Boston
http://cwonline.computerworld.com/t/9216852/823929840/743860/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ada75194
3. The one-minute security manager
http://cwonline.computerworld.com/t/9216852/823929840/743861/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=11623547
4. INSIDER: 10 terrifying extreme hacks
http://cwonline.computerworld.com/t/9216852/823929840/743862/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f25d8e0b
5. INSIDER: IoT is the password killer we've been waiting for
http://cwonline.computerworld.com/t/9216852/823929840/743863/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d67771e4
6. 6 reasons why there will be another OPM-style hack
http://cwonline.computerworld.com/t/9216852/823929840/743864/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=90a12d7d
7. INSIDER: Review: New approaches to endpoint security
http://cwonline.computerworld.com/t/9216852/823929840/743865/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2e766f27
8. Software developers aren't implementing encryption correctly
http://cwonline.computerworld.com/t/9216852/823929840/743866/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=9e169613
9. INSIDER: Macros big again with cybercriminals
http://cwonline.computerworld.com/t/9216852/823929840/743867/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5175c0c3
10. Opinion: Linksys Smart Wi-Fi makes a stupid Guest network
http://cwonline.computerworld.com/t/9216852/823929840/743868/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d6d9c312
11. Just how secure is that hotspot?
http://cwonline.computerworld.com/t/9216852/823929840/743869/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=865707d6
12. INSIDER: Review: The best password managers for PCs, Macs, and mobile devices
http://cwonline.computerworld.com/t/9216852/823929840/743870/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6ccc983b
13. INSIDER: Banks get attacked four times more than other industries
http://cwonline.computerworld.com/t/9216852/823929840/743871/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6a0f9a0e
14. The NetUSB router flaw, Part 2: Detection and mitigation
http://cwonline.computerworld.com/t/9216852/823929840/743872/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=8dec5e93
15. INSIDER: Phishers target middle management
http://cwonline.computerworld.com/t/9216852/823929840/743873/39/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=03dd66c2
16. How encryption keys could be stolen by your lunch
http://cwonline.computerworld.com/t/9216852/823929840/743874/40/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a6d8c607
17. INSIDER: Agencies need to pay more attention to supply chain security
http://cwonline.computerworld.com/t/9216852/823929840/743875/41/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=378a2551
~~~~~~~~~~~~~~~~~~~WEBCAST: Nutanix~~~~~~~~~~~~~~~~~~~~~
Evolution of Flash in the Datacenter
Driven by trends of virtualization and cloud computing, storage requirements
have significantly changed in last few years. The question is no longer about
the need for flash, but how best to use flash to meet today's and future
applications needs.
http://cwonline.computerworld.com/t/9216852/823929840/743876/42/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=fbf4586d
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 backup and security tips for frequent fliers
Do your data security plans include recovery contingencies for when you're
traveling?
http://cwonline.computerworld.com/t/9216852/823929840/743859/43/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=5dcbc5e1
INSIDER: CSO salaries rise fastest in New York, Boston
The average CSO salary is now 4% higher than last year as a result of more
responsibility and better visibility, with salaries in New York and Boston
rising even faster, according to a new report. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/9216852/823929840/743860/44/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=f9633885
The one-minute security manager
Many organizations today do not feel that they can afford to have a dedicated
information security manager or analyst. This responsibility often falls to an
existing staff member with other responsibilities. While far from ideal, it is
possible to have some impact on your security posture when it is not your
full-time focus. From the IDG Contributor Network.
http://cwonline.computerworld.com/t/9216852/823929840/743861/45/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6729f86c
INSIDER: 10 terrifying extreme hacks
Truly innovative or thought-provoking hacks are few and far between, but these
extreme hacks have earned the grudging respect of security experts. (Insider -
free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743862/46/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a1e3c43a
INSIDER: IoT is the password killer we've been waiting for
IoT, with its tiny screens and headless devices, will drive an authentication
revolution. It's a short leap from the kind of two-factor authentication used on
the Apple Watch to proximity-based authentication that does away with any user
interaction. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743863/47/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e507755d
6 reasons why there will be another OPM-style hack
Congress might fume about the security failures, but the truth is that it's part
of the problem.
http://cwonline.computerworld.com/t/9216852/823929840/743864/48/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=406ebf6c
INSIDER: Review: New approaches to endpoint security
In our recent roundup of anti-virus programs, we discovered several new
techniques being employed by anti-virus companies to make PCs safer against
advanced threats. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743865/49/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c5ded7e9
Software developers aren't implementing encryption correctly
Despite a big push to use encryption to fight security breaches, lack of
expertise among developers and overly complex libraries have led to widespread
implementation failures.
http://cwonline.computerworld.com/t/9216852/823929840/743866/50/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b6eb00d8
~~~~~~~~~~~~~~~~~~~WEBCAST: Alcatel-Lucent USA Inc.~~~~~~~~~~~~~~~~~~~~~
Digital Financial Transactions Flying High in the Clouds
This webinar reviews cloud infrastructure trends and solutions for the financial
services industry.
http://cwonline.computerworld.com/t/9216852/823929840/743877/51/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=99e14357
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
INSIDER: Macros big again with cybercriminals
Up to a year ago, most phishing emails were all about tricking users into
clicking on malicious links that led to malware downloads. Starting last fall,
however, the use of attachments increased eight-fold, and that increase has
persisted to this day, according to a new report. (Insider - free registration
required.)
http://cwonline.computerworld.com/t/9216852/823929840/743867/52/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e2b98016
Opinion: Linksys Smart Wi-Fi makes a stupid Guest network
A recent article pointed out that Linksys and Belkin routers are incapable of
offering over-the-air encryption (WEP, WPA or WPA2) on their Guest wireless
networks. On top of this, their Guest networks use a captive portal, which is
confusing at best. I verified these problems and found even more issues with the
Guest network created by a Linksys Smart WiFi router.
http://cwonline.computerworld.com/t/9216852/823929840/743868/53/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b0962523
Just how secure is that hotspot?
Sure free Wi-Fi is convenient and cost-free, but what is the risk to my mobile
device and how do I fight back? From the IDG Contributor Network.
http://cwonline.computerworld.com/t/9216852/823929840/743869/54/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=b6b428bf
INSIDER: Review: The best password managers for PCs, Macs, and mobile devices
10 local and cloud-based contenders make passwords stronger and online life
easier for Windows, OS X, iOS, Android, BlackBerry and Windows Phone users.
(Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743870/55/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=eb7d6af6
INSIDER: Banks get attacked four times more than other industries
According to a new report from Websense Security Labs, the average number of
attacks against financial services institutions is four times higher than that
of companies in other industries. In addition, a third of all initial-stage
reconnaissance attacks target financial institutions. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743871/56/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=92c968cc
The NetUSB router flaw, Part 2: Detection and mitigation
Without a comprehensive list of routers vulnerable to the NetUSB flaw, the
burden falls on us to test our routers. This requires scanning for port 20005 on
the LAN side, for sure, and possibly the WAN side too. Here I describe scanning
for open TCP/IP LAN side ports using Windows, OS X and Android.
http://cwonline.computerworld.com/t/9216852/823929840/743872/57/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=eb660237
INSIDER: Phishers target middle management
Phishing scammers have busy middle managers in the crosshairs. Here's how to
avoid being a victim. (Insider - free registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743873/58/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=a4e6dedd
How encryption keys could be stolen by your lunch
A device, hidden in pita bread, can collect signals that can betray encryption
keys.
http://cwonline.computerworld.com/t/9216852/823929840/743874/59/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=3d0909da
INSIDER: Agencies need to pay more attention to supply chain security
Government agencies seeking the lowest bidders typically overlook cybersecurity
when awarding contracts, and data breaches are the result. (Insider - free
registration required.)
http://cwonline.computerworld.com/t/9216852/823929840/743875/60/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eV9pc3N1ZXM%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=2f53243c
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9216852/823929840/724679/61/
Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 14.
http://cwonline.computerworld.com/t/9216852/823929840/736669/62/
Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
here: http://cwonline.computerworld.com/t/9216852/823929840/738200/63/
Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9216852/823929840/741285/64/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9216852/823929840/641183/65/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9216852/823929840/689330/66/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9216852/823929840/689330/67/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9216852/823929840/156832/68/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9216852/823929840/311619/69/
Facebook: http://cwonline.computerworld.com/t/9216852/823929840/311620/70/
Twitter: http://cwonline.computerworld.com/t/9216852/823929840/311621/130/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security_issues as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9216852/823929840/131135/131/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODQwLjIzMzZmYjBlZWQ5NTcxOTgwMmJhOTZmMjZlZWI0MTllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHlfaXNzdWVzJm89OTIxNjg1Mg%3d%3d&x=de43c2fb
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9216852/823929840/689329/132/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9216852/823929840/689329/133/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9216852/823929840/689331/134/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, July 1, 2015
Fingerprint sensors on their way to more smartphones
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 7:27 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment