Search This Blog

Thursday, August 20, 2015

The shocking truth about Proactive intelligence in iOS 9

Computerworld Security: August 20, 2015
===============================================================

The shocking truth about Proactive intelligence in iOS 9

Proactive is Apple's name for an intelligent iOS 9 technology wants to help you
get things done – but shockingly it tries to keep your private life private.
http://cwonline.computerworld.com/t/9266388/1592880030/753542/17/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=f3af5497

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Neustar Inc~~~~~~~~~~~~~~~~~~~~~

4 Ways Neustar Strengthens Your DNS Security

There are criminals who redirect DNS queries to their own servers to steal
credit card data and other sensitive information, and the exploding problem of
distributed denial of service (DDoS) attacks, often aimed at DNS to cripple
online business. There are steps that can be taken to protect DNS, lower
business risk, and defend your brand.

http://cwonline.computerworld.com/t/9266388/1592880030/753543/18/?3e076d18=c2VjdXJpdHkud29ybGRAZ21haWwuY29t&x=e8a07aa3

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Senator to introduce proposal for mandatory drone geofencing
http://cwonline.computerworld.com/t/9266388/1592880030/753544/19/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=acd2d717

2. Russian cyberspies targeted punk rock band Pussy Riot
http://cwonline.computerworld.com/t/9266388/1592880030/753545/20/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=5e58bdf2

3. China arrests 15,000 for Internet-related crimes
http://cwonline.computerworld.com/t/9266388/1592880030/753546/21/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=da22452e

4. North Korean leader has his own cellular network
http://cwonline.computerworld.com/t/9266388/1592880030/753547/28/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=f6e832dd

5. Attackers are using insecure routers and other home devices for DDoS attacks
http://cwonline.computerworld.com/t/9266388/1592880030/753548/29/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=6c8dcdba


~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: CSO Security Smart~~~~~~~~~~~~~~~~~~~~~

Security Smart: The Employee Security Awareness Newsletter

Security Smart is a quarterly security awareness newsletter ready for
distribution to your employees— saving you precious time on employee education!
The compelling content combines personal and organization safety tips so is
applicable to many facets of employees' lives.

http://cwonline.computerworld.com/t/9266388/1592880030/354950/30/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Senator to introduce proposal for mandatory drone geofencing

U.S. Sen. Charles Schumer is to introduce a proposal soon that aims to make
geofencing of drones mandatory, following a number of reports of close shaves
between the unmanned aircraft and regular planes.
http://cwonline.computerworld.com/t/9266388/1592880030/753544/31/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=3b84e305

Russian cyberspies targeted punk rock band Pussy Riot

A closely watched band of suspected Russian hackers have spied on domestic
targets, including two members of the outspoken punk rock band Pussy Riot.
http://cwonline.computerworld.com/t/9266388/1592880030/753545/32/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=7e39d070

~~~~~~~~~~~~~~~~~~~WHITE PAPER: NTT America~~~~~~~~~~~~~~~~~~~~~

Conquering the Cloud

With more and more organizations adopting a hybrid cloud model, how do IT and
business decision makers view such issues as migration, budgeting and services?
According to a recent survey, the challenges businesses face in moving to the
cloud, while considerable, can be overcome by working in partnership with the
right cloud services provider.

http://cwonline.computerworld.com/t/9266388/1592880030/753549/33/?3e076d18=c2VjdXJpdHkud29ybGRAZ21haWwuY29t&x=17ec029a

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

China arrests 15,000 for Internet-related crimes

China's efforts to clean up the Internet have resulted in 15,000 arrests related
to cybercrimes, authorities revealed on Tuesday.
http://cwonline.computerworld.com/t/9266388/1592880030/753546/34/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=89dbd49b

North Korean leader has his own cellular network

Kim Jong Un and other high-ranking officials in North Korea have their own
cellular network to help keep their conversations secure
http://cwonline.computerworld.com/t/9266388/1592880030/753547/35/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=efbeec09

Attackers are using insecure routers and other home devices for DDoS attacks

Attackers are taking advantage of home routers and other devices that respond to
UPnP requests over the Internet to amplify DDoS attacks.
http://cwonline.computerworld.com/t/9266388/1592880030/753548/36/?c1e998ea=Y29tcHV0ZXJ3b3JsZF9zZWN1cml0eQ%3d%3d&03f17c32=MDBlNmE3YzFiODA1Zjc4YjczNjk3MThjMDhhZjM2NTE%3d&x=47a3d9a5



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include
our most popular departments -- News Analysis, Features, Opinions and Shark Tank
-- all free for download with registration.
These digital magazines also feature Computerworld signature packages, including
our IT Careers 2015 Special Report, with the latest on hot skills and hiring
trends, and our Forecast 2015 report, with unique insights into the IT budgets,
project priorities and staffing strategies of top IT leaders.
View them all at http://cwonline.computerworld.com/t/9266388/1592880030/724679/37/


Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated
leadership in their organizations through the use of IT and have the strategic
vision to align technology with business goals. Nominations close July 31.
http://cwonline.computerworld.com/t/9266388/1592880030/736669/38/


Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service?
That's what we want to find out. For the third year, Computerworld is polling
readers to find out how they feel about their mobile data provider, how much
they pay, how they use their mobile data connections and more. Take the survey
here: http://cwonline.computerworld.com/t/9266388/1592880030/738200/39/

Computerworld's 2015 cloud computing survey is underway!
Computerworld is conducting a brief survey regarding cloud computing
initiatives, and we would value your input. This confidential survey should take
no more than 10 minutes of your time. Take the survey here:
http://cwonline.computerworld.com/t/9266388/1592880030/749518/40/

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT
practitioners about the technology, business opportunities and challenges you
face everyday. We invite you to participate by applying to be a contributor
today.

http://cwonline.computerworld.com/t/9266388/1592880030/689530/41/

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report
on the top organizations across the country that offer technology pros
challenging projects, robust salaries and flexible work/life options.
http://cwonline.computerworld.com/t/9266388/1592880030/741285/42/

Free Shark Tank T-shirt

Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it
gets published, you get a sharp Shark shirt.

Submissions
mailto:sharky@computerworld.com

Shark Tank FAQ
http://cwonline.computerworld.com/t/9266388/1592880030/641183/43/


Internet of Things: Get the latest news!

Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly
evolving technologies, trends and developments related to the Internet of Things
(IoT).

Subscribe now and stay up to date!

http://cwonline.computerworld.com/t/9266388/1592880030/689330/44/

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get
Computerworld's up-to-the-minute top stories of the day, both first thing in the
morning and late in the afternoon (ET). We deliver breaking news on topics like
the latest security threats and the newest mobile devices, in-depth features
about enterprise technologies and IT careers, and authoritative analyses of
moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

Sign up now: http://cwonline.computerworld.com/t/9266388/1592880030/689330/45/

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/9266388/1592880030/156832/46/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/9266388/1592880030/311619/47/

Facebook: http://cwonline.computerworld.com/t/9266388/1592880030/311620/48/

Twitter: http://cwonline.computerworld.com/t/9266388/1592880030/311621/49/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: security.world@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/9266388/1592880030/131135/50/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MTU5Mjg4MDAzMC42ZDA2NGJjZTFhYTc0MzBjODk3NmUzNzliNmZjMDk1MCZuPVQmbD1jb21wdXRlcndvcmxkX3NlY3VyaXR5Jm89OTI2NjM4OA%3d%3d&x=6c33cec6

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/9266388/1592880030/689329/51/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/9266388/1592880030/689329/52/

When accessing content promoted in this email, you are providing consent for
your information to be shared with the sponsors of the content. Please see our
Privacy Policy for more information.

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/9266388/1592880030/689331/53/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

1 comment:

Blogger said...

YoBit lets you to claim FREE CRYPTO-COINS from over 100 unique crypto-currencies, you complete a captcha one time and claim as much as coins you need from the available offers.

After you make about 20-30 claims, you complete the captcha and keep claiming.

You can click claim as much as 50 times per one captcha.

The coins will held in your account, and you can exchange them to Bitcoins or Dollars.