Search This Blog

Thursday, July 23, 2015

Thanks for all the phish

Computerworld Security: July 23, 2015

Thanks for all the phish

Verizon, in its 2015 Data Breach Investigation Report, found that for three
years running, phishing attacks were a part of over two-thirds of
cyber-espionage incidents. Since a single user click can start a chain of events
resulting in a catastrophic data breach, it is imperative that we improve
control of spam/phishing.

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Centrify Corporation~~~~~~~~~~~~~~~~~~~~~

Five Simple Steps to Securing Your Corporate Identities

Identity Challenges in Today's Cloud and Mobile World: The days of on-site
servers running local applications that could only be accessed via on-site PCs
are over.



1. When the good guys are wielding the lasers

2. Free tools to find out if your computer is infected with Hacking Team malware

3. Court rules that 'pocket-dialed' calls aren't private

4. Hacker: 'Hundreds of thousands' of vehicles are at risk of attack

5. N.Y. judge rules against Facebook in search warrant case

~~~~~~~~~~~~~~~~~~~WHITE PAPER: LightCyber~~~~~~~~~~~~~~~~~~~~~

Using Active Breach Detection Against Advanced Attackers

Attackers can launch unlimited intrusion attempts, consequence-free, until they
find a successful technique to circumvent a target company's prevention systems.
This paper shows how to flip the odds on attackers and stop them after they have
managed to access your network.


When the good guys are wielding the lasers

Lasers can be used to steal sensitive data, even over long distances. New
research at MIT shows that they can also be used to protect data.

Free tools to find out if your computer is infected with Hacking Team malware

Rook Security offers Milano, a free tool to scan your PC for any possible
Hacking Team malware infection. Facebook offers osquery to detect Hacking Team's
Remote Control System on OS X. Lookout has mobile covered and can detect
surveillance malware on Android and iOS platforms.

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Centrify Corporation~~~~~~~~~~~~~~~~~~~~~

Office 365 Single Sign-On

For most organizations, the move to Office 365 (O365) is a leap forward in user
experience, productivity,it simplification, and savings. But organizations that
fail to implement Single Sign-On (SSO) reliably can slip backwards in several
key areas. Risk can actually increase and productivity suffer. Learn how to make
SSO reliable yet simple.


Court rules that 'pocket-dialed' calls aren't private

A federal appeals court in Ohio has ruled that a person who accidentally "pocket
dials" someone shouldn't expect any overheard conversation to be considered

Hacker: 'Hundreds of thousands' of vehicles are at risk of attack

A hacker who was able to wirelessly gain access to a Jeep and control its vital
functions said he could do the same with any number of vulnerable vehicles on
the road today.

N.Y. judge rules against Facebook in search warrant case

A New York judge ruled Tuesday that Facebook has no legal standing to challenge
the constitutionality of search warrants served on its users, highlighting the
limits to online companies' abilities to protect user privacy.


Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at

Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 31.

Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT
practitioners about the technology, business opportunities and challenges you
face everyday. We invite you to participate by applying to be a contributor

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.


Shark Tank FAQ

Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things

Subscribe now and stay up to date!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now:

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

Get more IT peer perspective online:

LinkedIn Group:





You are currently subscribed to computerworld_security as:

To unsubscribe from this newsletter, go to:

To manage your subscription preferences, go to:

To subscribe to a newsletter, go to:

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:

If you are interested in advertising in this newsletter, please contact:

To contact Computerworld, please send an e-mail to

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to **

No comments: