Computerworld Security: January 06, 2011 ===============================================================
Researchers confirm Googler's Internet Explorer bug French security researchers today confirmed the presence of a bug in Internet Explorer (IE) that's at the center of a spat between Microsoft and a Google security engineer. http://cwonline.computerworld.com/t/7121808/114916/352186/0/ ~~~~~~~~~~~~~~~~~~~WHITE PAPER: MessageLabs~~~~~~~~~~~~~~~~~~~~~ Managing Your Wireless Workforce True mobile security doesnt stop at devices and software. It relies just as much on the actions of end users. This means companies must instill a culture of security within their organizations. This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce. http://cwonline.computerworld.com/t/7121808/114916/352187/0/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IN THIS ISSUE 1. Microsoft, Googler tussle over bug timeline http://cwonline.computerworld.com/t/7121808/114916/352188/0/ 2. Alleged Miley Cyrus hacker arrested http://cwonline.computerworld.com/t/7121808/114916/352189/0/ 3. S. Korean police say Google collected private data illegally http://cwonline.computerworld.com/t/7121808/114916/352190/0/ 4. Darlene Storm: Tightening security to CIA paranoid mentality in post-WikiLeaks era http://cwonline.computerworld.com/t/7121808/114916/352191/0/ 5. Recalculating the telephony security equation http://cwonline.computerworld.com/t/7121808/114916/352192/0/ 6. Implications of next-decade computing http://cwonline.computerworld.com/t/7121808/114916/352193/0/ ~~~~~~~~~~~~~~~~~~~WHITE PAPER: F5 Networks~~~~~~~~~~~~~~~~~~~~~ Securing the Cloud Cloud computing has become another key resource for IT deployments, but there is still fear of securing applications and data in the cloud. With F5 devices, you can keep your most precious assets safe, no matter where they live. http://cwonline.computerworld.com/t/7121808/114916/352194/0/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Microsoft, Googler tussle over bug timeline Microsoft and a Google security engineer are sparring over a bug the researcher reported to Microsoft last July. http://cwonline.computerworld.com/t/7121808/114916/352188/0/ Alleged Miley Cyrus hacker arrested The 21-year-old hacker who boasted about breaking into Miley Cyrus' Gmail account and posting racy photographs of the teenage star has been arrested in Tennessee on fraud charges. http://cwonline.computerworld.com/t/7121808/114916/352189/0/ S. Korean police say Google collected private data illegally South Korea has concluded that Google illegally collected personal data while collecting information for its Street View map service, an official at the country's National Police Agency (NPA) said. http://cwonline.computerworld.com/t/7121808/114916/352190/0/ ~~~~~~~~~~~~~~~~~~~WHITE PAPER: Iron Mountain~~~~~~~~~~~~~~~~~~~~~ Compare PC Online Backup and Recovery Service Providers Online backup and recovery service providers have emerged from different market spaces and have different product focuses and business drivers. These providers can be grouped into three categories. This white paper helps IT professionals distinguish between these categories of service providers. http://cwonline.computerworld.com/t/7121808/114916/352195/0/?3e076d18=YXJjaGl2ZUBtYWlsLWFyY2hpdmUuY29t&x=cde76b4d ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Darlene Storm: Tightening security to CIA paranoid mentality in post-WikiLeaks era The Obama Administration has ordered drastic changes to plug security leaks. Grumpiness or a contact in the media may indicate you are an insider threat. Agencies are asked about monitoring former employees - as in capturing evidence of visits to WikiLeaks. Some believe the CIA mentality approach is paranoia, not security. http://cwonline.computerworld.com/t/7121808/114916/352191/0/ Recalculating the telephony security equation Among the threats that keep IT security managers up at night, attacks against phone systems have often ranked near the bottom. The last time we asked IT leaders about their telephony security plans, just 2% had experienced a security incident, and in almost all of these cases, the attack was internal misuse of phone systems for personal long-distance calls. Few had developed any sort of comprehensive security or risk analysis plan covering their voice systems. http://cwonline.computerworld.com/t/7121808/114916/352192/0/ Implications of next-decade computing In wrapping up our look at what the next decade's converged computing and communications capabilities will look like, there are some fundamental issues that were important (in a different form) 10 years ago that will continue to need to be addressed. http://cwonline.computerworld.com/t/7121808/114916/352193/0/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ BEST PLACES IN IT: DO YOU LOVE YOUR JOB? Computerworld is collecting nominations for the Best Places to Work in IT. If your IT department offers great benefits, competitive salaries, opportunities for training and advancement and access to interesting projects -- then get your organization recognized! Our special report, to be published in the June 20 edition of Computerworld, will spotlight the top 100 organizations that offer their IT staffs challenging and satisfying work environments. Nominate your company or another deserving company: http://cwonline.computerworld.com/t/7121808/114916/340171/0/ CAST YOUR VOTE IN OUR QUICKPOLL Cast your vote in our latest QuickPoll: What will be the biggest announcement from CES 2011? http://cwonline.computerworld.com/t/7121808/114916/351095/0/ SHARK TANK OF THE DAY ______________________ What's the hurry? Flashback to the 1970s, when this pilot fish's first job in IT is operating the machine that reads stacks of punched cards containing programs and data -- and every now and then, he has something to apologize for. http://cwonline.computerworld.com/t/7121808/114916/352083/0/ NEW COMPUTERWORLD JOB BOARD ______________________________ Search multiple listings now and get new job alerts as they are posted. http://cwonline.computerworld.com/t/7121808/114916/156832/0/ Get more IT peer perspective online: LinkedIn Group: http://cwonline.computerworld.com/t/7121808/114916/311619/0/ Facebook: http://cwonline.computerworld.com/t/7121808/114916/311620/0/ Twitter: http://cwonline.computerworld.com/t/7121808/114916/311621/0/ =============================================================== CONTACTS/SUBSCRIPTIONS You are currently subscribed to computerworld_security as: arch...@mail-archive.com. To unsubscribe from this newsletter, go to: http://cwonline.computerworld.com/t/7121808/114916/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MTE0OTE2LmQwMjdhOTc3ZDZmMmEyYzkwZjlkN2ZmNDllMWFlMjg4Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03MTIxODA4&x=8166ecbe To manage your subscription preferences, go to: http://cwonline.computerworld.com/t/7121808/114916/72510/0/ To subscribe to a newsletter, go to: http://cwonline.computerworld.com/t/7121808/114916/231613/0/ Computerworld's online privacy policy is at: http://cwonline.computerworld.com/t/7121808/114916/72509/0/ If you are interested in advertising in this newsletter, please contact: bgl...@cxo.com To contact Computerworld, please send an e-mail to onl...@computerworld.com. Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to onl...@computerworld.com **