Search This Blog

Monday, August 10, 2015

Mozilla issues quick fix for Firefox zero-day bug

Computerworld Security: August 10, 2015
===============================================================

Mozilla issues quick fix for Firefox zero-day bug

Mozilla has updated its Firefox browser to patch a zero-day vulnerability being
used to harvest passwords on Windows and Linux machines.
http://cwonline.computerworld.com/t/9253224/1592880030/750995/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=8e99093c

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Absolute Software Corporation~~~~~~~~~~~~~~~~~~~~~

HIPAA Violations Incur Multi-Million in Penalties

As mobile transforms into an overall endpoint-computing strategy, IT leaders
need to embrace endpoint-computing innovation and re-evaluate their strategies.
Click to learn more.

http://cwonline.computerworld.com/t/9253224/1592880030/750996/18/?3e076d18=c2VjdXJpdHkud29ybGRAZ21haWwuY29t&x=941f3443

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. How infosec can really shine
http://cwonline.computerworld.com/t/9253224/1592880030/750997/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=8b597c6b

2. Researchers show how to steal Windows Active Directory credentials from the Internet
http://cwonline.computerworld.com/t/9253224/1592880030/750998/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=1ef75919

3. Internal LTE/3G modems can be hacked to help malware survive OS reinstalls
http://cwonline.computerworld.com/t/9253224/1592880030/750999/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=8856cc67

4. Hackers show off long-distance Wi-Fi radio proxy at DEF CON
http://cwonline.computerworld.com/t/9253224/1592880030/751000/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=2487b2f8

5. Def Con: How to virtually kill someone or cash in on fake babies
http://cwonline.computerworld.com/t/9253224/1592880030/751001/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=94f0ba10

6. Attack on Sabre reportedly conducted by Anthem, OPA hackers
http://cwonline.computerworld.com/t/9253224/1592880030/751002/30/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=5cfe0705


~~~~~~~~~~~~~~~~~~~WHITE PAPER: LightCyber~~~~~~~~~~~~~~~~~~~~~

Using Active Breach Detection Against Advanced Attackers

Attackers can launch unlimited intrusion attempts, consequence-free, until they
find a successful technique to circumvent a target company's prevention systems.
This paper shows how to flip the odds on attackers and stop them after they have
managed to access your network.

http://cwonline.computerworld.com/t/9253224/1592880030/751003/31/?3e076d18=c2VjdXJpdHkud29ybGRAZ21haWwuY29t&x=4145b277

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

How infosec can really shine

Don't be a pessimist — your information security organization can be a real
success. I've seen it.
http://cwonline.computerworld.com/t/9253224/1592880030/750997/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=13d1cc2c

Researchers show how to steal Windows Active Directory credentials from the Internet

An attack using the SMB file sharing protocol thought to work only in local area
networks can also be executed over the Internet, two researchers showed at Black
Hat.
http://cwonline.computerworld.com/t/9253224/1592880030/750998/33/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=f189ecd3

Internal LTE/3G modems can be hacked to help malware survive OS reinstalls

With their own dedicated processor and operating system, LTE/3G modems built
into new business laptops and tablets could be a valuable target for hackers by
providing a stealthy way to maintain persistent access to an infected device.
http://cwonline.computerworld.com/t/9253224/1592880030/750999/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=282f761d

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Return Path~~~~~~~~~~~~~~~~~~~~~

The DMARC Intelligence Report

Today, DMARC is the best remedy in the fight against phishing with the potential
to nullify an entire class of fraud within the next few years. Learn which
industries are early adopters, and which are failing to protect their brand and
customers.

http://cwonline.computerworld.com/t/9253224/1592880030/751004/35/?3e076d18=c2VjdXJpdHkud29ybGRAZ21haWwuY29t&x=1e5ef1fc

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Hackers show off long-distance Wi-Fi radio proxy at DEF CON

A talk about a radio-based privacy device dubbed ProxyHam that promised to allow
hackers to connect to Wi-Fi networks from as far as 2.5 miles away was abruptly
pulled from the DEF CON schedule by its creator a few weeks ago.
http://cwonline.computerworld.com/t/9253224/1592880030/751000/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=967bdda0

Def Con: How to virtually kill someone or cash in on fake babies

Thanks to an 'end of life' vulnerability, almost anyone can easily kill you off
digitally. Imagine the nightmare of trying to get an official ID then. The
virtual birthing process is even easier to exploit.
http://cwonline.computerworld.com/t/9253224/1592880030/751001/37/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=a15dcfe1

Attack on Sabre reportedly conducted by Anthem, OPA hackers

Travel industry software maker Sabre is the latest company said to have been hit
by the same hackers who recently attacked U.S. health insurer Anthem and the
U.S. Office of Personnel Management, while American Airlines has been
investigating its own systems for evidence of a similar breach.
http://cwonline.computerworld.com/t/9253224/1592880030/751002/38/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=74c9757a



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9253224/1592880030/724679/39/


Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 31.
http://cwonline.computerworld.com/t/9253224/1592880030/736669/40/


Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
here: http://cwonline.computerworld.com/t/9253224/1592880030/738200/41/

Computerworld's 2015 cloud computing survey is underway!
Computerworld is conducting a brief survey regarding cloud computing
initiatives, and we would value your input. This confidential survey should take
no more than 10 minutes of your time. Take the survey here:
http://cwonline.computerworld.com/t/9253224/1592880030/749518/42/

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT
practitioners about the technology, business opportunities and challenges you
face everyday. We invite you to participate by applying to be a contributor
today.

http://cwonline.computerworld.com/t/9253224/1592880030/689530/43/

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9253224/1592880030/741285/44/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9253224/1592880030/641183/45/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9253224/1592880030/689330/46/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9253224/1592880030/689330/47/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9253224/1592880030/156832/48/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9253224/1592880030/311619/49/

Facebook: http://cwonline.computerworld.com/t/9253224/1592880030/311620/50/

Twitter: http://cwonline.computerworld.com/t/9253224/1592880030/311621/51/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: security.world@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9253224/1592880030/131135/52/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MTU5Mjg4MDAzMC42ZDA2NGJjZTFhYTc0MzBjODk3NmUzNzliNmZjMDk1MCZuPVQmbD1jb21wdXRlcndvcmxkX3NlY3VyaXR5Jm89OTI1MzIyNA%3d%3d&x=9f935483

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9253224/1592880030/689329/53/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9253224/1592880030/689329/54/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9253224/1592880030/689331/55/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

No comments: