Wednesday, March 1, 2017

Ransomware 'customer support' chat reveals criminals' ruthlessness

Java and Python FTP attacks can punch holes through firewalls

Email not displaying correctly? View it in your browser.

Computerworld Security Issues and Trends

Mar 01, 2017
Featured Image

Ransomware 'customer support' chat reveals criminals' ruthlessness

Finnish security vendor F-Secure released 34 pages of transcripts from the group chat used by the crafters of the Spora ransomware family. The transcripts give a whole new meaning to tech support. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Java and Python FTP attacks can punch holes through firewalls
7 Wi-Fi vulnerabilities beyond weak passwords
A hard drive's LED light can be used to covertly leak data
What to expect from the Trump administration on cybersecurity
The SHA1 hash function is now completely unsafe
Why you need a bug bounty program
True privacy online is not viable
Here's how the U.S. government can bolster cybersecurity
Microsoft's decision to scrap February security updates unnerves patch experts
Tips for negotiating with cyber extortionists
Insecure Android apps put connected cars at risk

Video/Webcast: Hewlett Packard Enterprise

5 Steps Towards Autonomous IT Operations with HPE Operations Bridge

Digital divide, digital enterprise, and transformation all impact your IT, especially as business teams demand more with less. It hasn't been so daunting for numerous customers who have evolved their operations using our HPE Operations Bridge software. Would you like learn how to reduce MTTR by 58%? Would you like to perform 50% more work with the same IT Operations staff? Join us to learn how to do that, and who already has. Read More

Thumbnail Image

Java and Python FTP attacks can punch holes through firewalls

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. Read More

Thumbnail Image
INSIDER

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you're not exposed in these other ways. Read More

Thumbnail Image

A hard drive's LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware. Read More

Thumbnail Image

What to expect from the Trump administration on cybersecurity

Look for the Trump administration to push for increased cybersecurity spending in government, but also for increased digital surveillance and encryption workarounds. Read More

Thumbnail Image

The SHA1 hash function is now completely unsafe

Security researchers have achieved the first real-world collision attack against the SHA-1 hash function, producing two different PDF files with the same SHA-1 signature. Read More

Thumbnail Image
INSIDER

Why you need a bug bounty program

If you're ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do. Read More

Thumbnail Image

True privacy online is not viable

You can hide from casual observers, but a motivated person will see through your attempts at anonymization. Read More

Thumbnail Image

Here's how the U.S. government can bolster cybersecurity

Almost 20 years ago, Chris Wysopal was among a group of hackers who testified before Congress, warning about the dangers of the internet. Read More

Thumbnail Image

Microsoft's decision to scrap February security updates unnerves patch experts

Patch experts struggled with Microsoft's decision to cancel this month's updates, pointing out that known vulnerabilities will go unpatched and IT planning was disrupted. Read More

Thumbnail Image
INSIDER

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need a plan for negotiating with people who take their data hostage. Read More

Thumbnail Image

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could allow hackers to easily hijack their functionality. Read More

White Paper: Winshuttle

5 Ways Excel Accelerates Your Return On SAP FICO Business Processes

How can a finance and/or controller professional access SAP FICO data leveraging Microsoft Excel in a highly usable and interoperable fashion while respecting all of the SAP core security and governance controls? Read More

Does Your Data Discriminate? Read Computerworld's newest digital magazine

Learn how to prevent data biases in the January/February 2017 issue of Computerworld's monthly Digital Magazine. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security Issues and Trends as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive