Computerworld Security: November 25, 2015
===============================================================
Dell Danger! "Superfish 2.0" blunder: It gets worse
Every Dell desktop and laptop shipped since August has contained three bogus
root certificates, including eDellRoot. Not only that, but two certs include
their own private keys! It's like Superfish all over again...
http://cwonline.computerworld.com/t/9369490/823929835/775401/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=44e38a17
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Teradata~~~~~~~~~~~~~~~~~~~~~
A New Strategic Approach to Data and Analytics
Many confuse the adoption of big data technology with creating a coherent big
data strategy and in the process are creating "big data debt". Learn the
concepts and guidelines that remedy that debt and increases your long-term
results by taking a new data and analytics centric approach.
http://cwonline.computerworld.com/t/9369490/823929835/775402/18/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=61dbbf03
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. A second dangerous Dell root certificate discovered
http://cwonline.computerworld.com/t/9369490/823929835/775403/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=d7a9f77b
2. IDG Contributor Network: Healthcare security and HIPAA: Why compliance and security are still lacking
http://cwonline.computerworld.com/t/9369490/823929835/775404/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=ba1409c7
3. IDG Contributor Network: OAuth 2.0: The protocol at the center of the universe
http://cwonline.computerworld.com/t/9369490/823929835/775405/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=58e931ef
4. What you need to know about Dell's root certificate security debacle
http://cwonline.computerworld.com/t/9369490/823929835/775406/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e6ba6ef8
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Neustar Inc~~~~~~~~~~~~~~~~~~~~~
What Erodes Trust in Digital Brands?
As our lives get more connected, a trusted digital brand becomes a priceless
asset. But according to new research, security, performance, and marketing flaws
combine to taint the customer experience.
http://cwonline.computerworld.com/t/9369490/823929835/775407/29/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c6af255b
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A second dangerous Dell root certificate discovered
After Dell confirmed that one of its support tools installed a dangerous
self-signed root certificate and private key on computers, users discovered a
similar certificate deployed by a different Dell tool.
http://cwonline.computerworld.com/t/9369490/823929835/775403/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=7137ecb2
IDG Contributor Network: Healthcare security and HIPAA: Why compliance and security are still lacking
A number of healthcare data breaches have made the news of late, particularly
involving large insurance companies and data clearinghouses. Often overlooked in
press reports are the smaller practices, which are, from my experience, seldom
fully HIPAA compliant. This article will discuss the reason compliance is
lacking, and outline how to get started.
http://cwonline.computerworld.com/t/9369490/823929835/775404/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=23a5e3ce
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Attunity~~~~~~~~~~~~~~~~~~~~~
Managing Rapid Data Growth: A Trial By Fire Hose
Is your data growing out of control? The bad news is that you've got your work
cut out for you when it comes to capturing and exploiting that data.
http://cwonline.computerworld.com/t/9369490/823929835/775408/32/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=310af8df
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IDG Contributor Network: OAuth 2.0: The protocol at the center of the universe
Public APIs are becoming a crucial business asset. A strong API strategy depends
on openness and standardization. A support for the OAuth 2.0 specification is
the first step towards a successful and secure API model.
http://cwonline.computerworld.com/t/9369490/823929835/775405/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=e3fe598f
What you need to know about Dell's root certificate security debacle
In an attempt to provide a more streamlined remote support experience, Dell
installed a self-signed root certificate and corresponding private key on its
customers' computers, exposing users' encrypted communications to potential
spying.
http://cwonline.computerworld.com/t/9369490/823929835/775406/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=NzlhODIzMDVmY2VlNWFkNTY3MTYwODNmMjg1ZjI4NDk%3d&x=0ae6d320
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Is your IT department a great place to work?
Computerworld is seeking to identify the 100 top workplaces for IT professionals
for our 23rd annual Best Places to Work in IT list. We invite Computerworld
readers, HR and PR professionals and other interested parties to nominate
organizations, in any industry, that they think are providing great working
environments for IT employees, including challenging work, fair pay and ample
training opportunities. Nominate a company now through Dec. 21, 2015:
http://cwonline.computerworld.com/t/9369490/823929835/774082/35/
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9369490/823929835/724679/36/
Read about the 6 traits of rising IT stars
Check out our October Digital Magazine, featuring a look at some of IT's rising
stars. What qualities put IT pros on the fast track to the top? These five
up-and-coming execs (and their bosses) offer advice on ways to hone your own
leadership skills. The magazine also includes News Analysis, Opinions and Shark
Tank -- all free for download with registration.
View the magazine at
http://cwonline.computerworld.com/t/9369490/823929835/763910/37/
Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9369490/823929835/741285/38/
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Submissions
mailto:sharky@computerworld.com
Shark Tank FAQ
http://cwonline.computerworld.com/t/9369490/823929835/641183/39/
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).
Subscribe now and stay up to date!
http://cwonline.computerworld.com/t/9369490/823929835/689330/40/
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9369490/823929835/689330/41/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/9369490/823929835/156832/42/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9369490/823929835/311619/43/
Facebook: http://cwonline.computerworld.com/t/9369490/823929835/311620/44/
Twitter: http://cwonline.computerworld.com/t/9369490/823929835/311621/45/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9369490/823929835/131135/46/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz05MzY5NDkw&x=1856e656
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9369490/823929835/689329/47/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9369490/823929835/689329/48/
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9369490/823929835/689331/49/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, November 25, 2015
Dell Danger! Superfish 2.0 blunder: It gets worse
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 5:54 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment