Monday, November 2, 2015

All CoinVault and Bitcryptor ransomware victims can now recover their files for free

<pre>Computerworld Security: November 02, 2015
===============================================================

All CoinVault and Bitcryptor ransomware victims can now recover their files for free

Researchers from Kaspersky Lab and the Dutch Public Prosecution Service have
obtained the last set of encryption keys from command-and-control servers that
were used by CoinVault and Bitcryptor, two related ransomware threats.
http://cwonline.computerworld.com/t/9337567/823929835/769537/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ceac9188

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Neustar Inc~~~~~~~~~~~~~~~~~~~~~

10 Cyberthreats Outside the Firewall

Unfortunately for the IT Administrator, security vulnerabilities are not found
exclusively in the cyber domain. Here is a list of ten current threats that can
cause real damage to an organization's bottom line, brand, and reputation- all
of which exist outside of a company's firewall.

http://cwonline.computerworld.com/t/9337567/823929835/769538/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=a1cbf17f

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. IDG Contributor Network: Is your information security program giving you static?
http://cwonline.computerworld.com/t/9337567/823929835/769539/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=13e47d0f

2. Iranian hackers show interest in Android spying tools
http://cwonline.computerworld.com/t/9337567/823929835/769540/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=6d8f5f8d

3. U.S. says it's okay to hack cars and medical devices (sometimes)
http://cwonline.computerworld.com/t/9337567/823929835/769541/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=c8c77aad


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Akamai~~~~~~~~~~~~~~~~~~~~~

New case study of attacks analysis

Utilizing new social tactics and DDoS methodology, the activities of
extortionist group DD4BC increased dramatically and targeted larger
organizations over one calendar year. Over 140 DDoS attacks attacks confirmed as
DD4BC were observed by Akamai with the financial services sector amongst the
most often targeted.

http://cwonline.computerworld.com/t/9337567/823929835/769542/28/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IDG Contributor Network: Is your information security program giving you static?

Unfortunately, the bad actors in the information security world have far more
time to spend breaking into our systems than we have to protect them. This
creates a constantly changing threat landscape. A static approach to protecting
systems is not able to keep up with evolving threats. To be successful, we must
move to a dynamic approach to protecting systems and networks.
http://cwonline.computerworld.com/t/9337567/823929835/769539/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7663a3fd

~~~~~~~~~~~~~~~~~~~WHITE PAPER: LogRhythm~~~~~~~~~~~~~~~~~~~~~

SIEM Critical Capabilities Report

"Critical capabilities" are attributes that differentiate products/services in a
class in terms of their quality and performance. Gartner recommends that users
consider the set of critical capabilities as some of the most important
criteria for acquisition decisions.

http://cwonline.computerworld.com/t/9337567/823929835/769543/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=22b57222

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Iranian hackers show interest in Android spying tools

Iranian hackers are showing a strong interest in malware that can secretly pull
data from Android devices, which are popular in the Middle East.
http://cwonline.computerworld.com/t/9337567/823929835/769540/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=46662356

U.S. says it's okay to hack cars and medical devices (sometimes)

The U.S. Copyright Office added security research on cars and medical devices to
the list of exemptions from rules prohibiting the circumvention of access
controls that are used to protect works.
http://cwonline.computerworld.com/t/9337567/823929835/769541/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=842e38b1



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9337567/823929835/724679/33/


Computerworld's 2016 IT Salary Survey: How does your salary compare with your IT
peers? Computerworld's 30th Annual Salary Survey will feature the latest IT
salary trends and advice on where to find the best-paying jobs. This year's
survey participants can enter a drawing to win 1 of 3 American Express gift
cheques for $500 each! The drawing is open to legal U.S. residents, age 18 or
older. Take our annual IT Salary Survey today!
http://cwonline.computerworld.com/t/9337567/823929835/754544/34/

Read about the 6 traits of rising IT stars
Check out our October Digital Magazine, featuring a look at some of IT's rising
stars. What qualities put IT pros on the fast track to the top? These five
up-and-coming execs (and their bosses) offer advice on ways to hone your own
leadership skills. The magazine also includes News Analysis, Opinions and Shark
Tank -- all free for download with registration.
View the magazine at
http://cwonline.computerworld.com/t/9337567/823929835/763910/35/

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9337567/823929835/741285/36/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9337567/823929835/641183/37/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9337567/823929835/689330/38/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9337567/823929835/689330/39/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9337567/823929835/156832/40/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9337567/823929835/311619/41/

Facebook: http://cwonline.computerworld.com/t/9337567/823929835/311620/42/

Twitter: http://cwonline.computerworld.com/t/9337567/823929835/311621/43/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9337567/823929835/131135/44/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MzM3NTY3&x=9bec94ed

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9337567/823929835/689329/45/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9337567/823929835/689329/46/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9337567/823929835/689331/47/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
</pre>

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:47 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive