Computerworld Security: August 19, 2015
Microsoft pushes out an emergency update for IE flaw
Windows users are being urged to update their computers as soon as possible,
after Microsoft pushed out a patch for an issue in Internet Explorer that lets
attackers remotely run malicious code with whatever privileges the current user
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Akamai~~~~~~~~~~~~~~~~~~~~~
Cost of Web Application Attacks
Ponemon Institute surveyed 594 IT professionals about 16 web application
security topics, including their experiences with costs of web application
attacks and the resources needed to manage them. Companies in this study
reported an average of $1.5 million in costs related to DoS over the past 12
months. Read the Full Report.
IN THIS ISSUE
1. Hackers release full data dump from Ashley Madison dating site
2. Internet company Web.com hit by credit card breach
3. Another vulnerability found in Android's media processing service
4. Ashley Madison hack -- STOP! Don't believe all that you read
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Absolute Software Corporation~~~~~~~~~~~~~~~~~~~~~
HIPAA Violations Incur Multi-Million in Penalties
As mobile transforms into an overall endpoint-computing strategy, IT leaders
need to embrace endpoint-computing innovation and re-evaluate their strategies.
Click to learn more.
Hackers release full data dump from Ashley Madison dating site
AshleyMadison.com's owner said Tuesday it is examining a large batch of data
posted online by hackers who breached the website last month.
Internet company Web.com hit by credit card breach
Hackers breached the computer systems of Internet services provider Web.com
Group and stole credit card information of 93,000 customers.
~~~~~~~~~~~~~~~~~~~: Entrust, Inc.~~~~~~~~~~~~~~~~~~~~~
Trusted Identities in Today's Connected Enterprise
Identity underpins our personal life, our work life, and is a core part of how
we interact with society. We have no shortage of identity markers, whether it's
a government issued ID, website log-in, or access key card. But are we reaching
a point of identity overload?
Another vulnerability found in Android's media processing service
The Android service that processes multimedia files has been the source of
several vulnerabilities recently, including a new one that could give rogue
applications access to sensitive permissions.
Ashley Madison hack -- STOP! Don't believe all that you read
Ashley Madison hackers released the site's user data, as threatened. Or, at
least, that's what they say they've done. But it's likely that much of the data
is forged or bogus in some way...
Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9264773/1592880030/724679/35/
Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 31.
Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
Computerworld's 2015 cloud computing survey is underway!
Computerworld is conducting a brief survey regarding cloud computing
initiatives, and we would value your input. This confidential survey should take
no more than 10 minutes of your time. Take the survey here:
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT
practitioners about the technology, business opportunities and challenges you
face everyday. We invite you to participate by applying to be a contributor
Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.
Shark Tank FAQ
Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
Subscribe now and stay up to date!
Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.
Sign up now: http://cwonline.computerworld.com/t/9264773/1592880030/689330/43/
Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/9264773/1592880030/311619/45/
You are currently subscribed to computerworld_security as: email@example.com.
To unsubscribe from this newsletter, go to:
To manage your subscription preferences, go to:
To subscribe to a newsletter, go to:
When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
If you are interested in advertising in this newsletter, please contact: firstname.lastname@example.org
To contact Computerworld, please send an e-mail to email@example.com.
Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to firstname.lastname@example.org **