Computerworld Security
May 06, 2009
___________________________________________________________
***************SPONSOR**************************************
State of Internet Security: Protecting Business Email
Email is vital in business communications and companies worldwide are dependent
upon it. In spite of measures taken by companies to protect against spam,
viruses, spyware, and other online threats, the frequency and sophistication of
attacks are growing. Due to the significant impact that these security threats
are having on businesses, new methods of protection are necessary to effectively
secure email and valuable data.
http://cwflyris.computerworld.com/t/4965788/283856143/187892/0/
************************************************************
In this issue:
1. Adobe promises patch for zero-day PDF bug by next Tuesday
2. As wireless monitoring device popularity grows, so do privacy worries
3. Update: Strike Fighter data was leaked on P2P network in 2005, security expert says
4. Consumer Reports rates free PC security software as 'best buy'
5. Apple, Opera slammed over browser patch regimes
6. Swedish man indicted in 2004 Cisco code theft
7. McAfee reports huge drop in spam
8. Why Information Must Be Destroyed, Part Two
9. Policy issues surround US gov't mounting cyberattacks
10. Bank of America still not ready for iPhone
OTHER RESOURCES
_______________
Bringing Order and Security to your Mobile Workforce
http://cwflyris.computerworld.com/t/4965788/283856143/180599/0/
The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
http://cwflyris.computerworld.com/t/4965788/283856143/187181/0/
How to Optimize Your Capture Workflow
http://cwflyris.computerworld.com/t/4965788/283856143/187240/0/
_______________
Adobe promises patch for zero-day PDF bug by next Tuesday
Adobe plans to patch the newest zero-day vulnerability in its popular Adobe
Reader software no later than May 12, potentially adding another update to what
will likely be the month's busiest patch day.
http://cwflyris.computerworld.com/t/4965788/283856143/188632/0/
As wireless monitoring device popularity grows, so do privacy worries
With the growth in monitoring, there's also growing concern that Big Brother
will have more eyes and ears than ever before.
http://cwflyris.computerworld.com/t/4965788/283856143/188633/0/
Update: Strike Fighter data was leaked on P2P network in 2005, security expert says
Data on the Pentagon's Joint Strike Fighter aircraft that was reported as being
illegally accessed by foreign cyberspies has been available for more than four
years on a peer-to-peer file-sharing network, the CEO of a software vendor said
at a legislative hearing.
http://cwflyris.computerworld.com/t/4965788/283856143/188634/0/
Consumer Reports rates free PC security software as 'best buy'
Consumer Reports slapped its 'best buy' label on a trio of free security
programs for Windows PCs, saying they are a smarter pick than suites from
companies like Symantec and McAfee.
http://cwflyris.computerworld.com/t/4965788/283856143/188635/0/
Apple, Opera slammed over browser patch regimes
Apple and Opera lag behind Google and Mozilla when it comes to distributing Web
browser updates due to how they've structured their patch programs, according to
new research.
http://cwflyris.computerworld.com/t/4965788/283856143/188636/0/
***************SPONSOR**************************************
Security Configuration Management
In this short web video, follow along with Jim Hansen, Senior Product Manager
with Big Fix, as he explains why Security Configuration Management is so
important for all organizations to consider as part of their natural threat and
vulnerability management solution. His knowledgeable recommendations and
explanation of key facts are a must-know for all organizations looking to
protect their business.
http://cwflyris.computerworld.com/t/4965788/283856143/187800/0/?3e076d18=YXVzdGluYW1lczIwMDgucGNtYWdAYmxvZ2dlci5jb20%3d&x=c79f0ea7
************************************************************
Swedish man indicted in 2004 Cisco code theft
A Swedish man was indicted on Tuesday in connection with the alleged 2004 theft
of source code for Cisco Systems' IOS (Internetwork Operating System) software.
http://cwflyris.computerworld.com/t/4965788/283856143/188637/0/
McAfee reports huge drop in spam
Global e-mail spam volumes have dropped 20% for the first quarter this year
compared with the same period last year, according to McAfee's latest research
on the topic.
http://cwflyris.computerworld.com/t/4965788/283856143/188638/0/
Why Information Must Be Destroyed, Part Two
In the first installment of Why Information Must Be Destroyed I discussed how
not discarding worthless hard copy documents, even though they appear to have no
value is a security risk. While this is true for physical hard copies, it is
even more relevant for digitally stored data.
http://cwflyris.computerworld.com/t/4965788/283856143/188639/0/
Policy issues surround US gov't mounting cyberattacks
Two weeks ago I wrote about methods by which law enforcement could cyber-target
individual miscreants. Since then, the National Research Council (NRC) of the
National Academies of Science has published a report on a whole different scale
of cybertargeting: It deals with policy issues of the United States mounting
cyberattacks on groups of cyberterrorists or on countries.
http://cwflyris.computerworld.com/t/4965788/283856143/188640/0/
Bank of America still not ready for iPhone
Despite Apple Inc.'s determination to make the iPhone enterprise-ready, there
are still some holdouts.
http://cwflyris.computerworld.com/t/4965788/283856143/188641/0/
***************SPONSOR**************************************
Addressing the Complexities of Remote Data Protection
Data protection and recovery can be a complicated problem in remote offices. But
there are options. This white paper explores a range of possibilities, and shows
how an adaptive data protection solution can protect remotely stored data for
enterprises of all sizes
http://cwflyris.computerworld.com/t/4965788/283856143/187956/0/
************************************************************
SHARK BAIT OF THE DAY
_____________________
No Help from the Help Desk
This past week, while on call, I receive a call while I am still en route home.
As I cannot assist anyone yet, I ask the person in the support center to call my
boss, who should still be at work, to see if he could assist ...
http://cwflyris.computerworld.com/t/4965788/283856143/188550/0/
SEEKING THE VERY BEST IT LEADERS
________________________________
Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at
http://cwflyris.computerworld.com/t/4965788/283856143/183552/0/
(Send questions to premier100@computerworld.com.)
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwflyris.computerworld.com/t/4965788/283856143/156832/0/
COMPUTERWORLD ON TWITTER
________________________
Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/4965788/283856143/126780/0/
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com
ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4965788/283856143/72509/0/
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.
To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4965788/283856143/72510/0/
To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4965788/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00OTY1Nzg4&x=3e01b7a9
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4965788/283856143/72511/0/
Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701
No comments:
Post a Comment