As smartphones increasingly hold interesting data, <a href="http://www.csoonline.com/article/686655/social-engineering-3-mobile-malware-techniques">attackers will target the devices using known vulnerabilities</a> in common software packages.
Robert Lemos |
27 Jul |
Read more
The torrent of <a href="http://www.networkworld.com/news/2011/061511-smartphones-tablets-security.html">smartphones and tablets entering companies</a> has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and <a href="http://www.networkworld.com/news/2011/022811-smartphones-security.html">new security risks</a>, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too!
Andreas M. Antonopoulos |
28 Jul |
Read more
Social engineers have been using various <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">dirty tricks</a> to fool people for centuries. <a href="http://www.csoonline.com/article/596512/social-engineering-techniques-4-ways-criminal-outsiders-get-inside">Social engineering</a>, the art of <a href="http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-">gaining access to buildings</a>, systems or data by exploiting <a href="http://www.csoonline.com/article/663329/social-engineering-3-examples-of-human-hacking">human psychology</a>, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.
Joan Goodchild |
26 Jul |
Read more
Apple on Monday issued a new patch that fixes a vulnerability that could allow an attacker to spoof an X.509 certificate used to encrypt web sessions on 4.3.4 iOS devices.
Liam Tung |
26 Jul |
Read more
Research in Motion’s (RIM) PlayBook tablet and a crypto product by its subsidiary have gained a key security credential that clears its path for use within US government and may signal RIM's wider plans to lure enterprise buyers.
Liam Tung |
25 Jul |
Read more
Is the cost of Windows security driving people to Apple? Afterall, running a Mac without any security software is inadvisable but running
Windows without any is insane.
Liam Tung |
22 Jul |
Read more
Senior executives on the hunt for greater mobility are pushing for
smartphone and tablet adoption in the enterprise, but can these
devices be adequately secured
Liam Tung |
22 Jul |
Read more
T-Mobile is hoping to make it easier for businesses to use Android phones by reselling secure e-mail services from Good Technology.
Nancy Gohring |
22 Jul |
Read more
A banking Trojan that has plagued Symbian, BlackBerry and <a href="http://www.networkworld.com/topics/windows.html">Windows</a> Phone users has now made its way to <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> devices.
Brad Reed |
15 Jul |
Read more
The hack of Sony's PlayStation Network in April this year was launched from the Amazon Web Services (AWS) cloud computing platform. But Amazon is keen to emphasise that it has procedures in place to reduce the likelihood of it happening again.
Stilgherrian |
14 Jul |
Read more
Mobile staff of a large financial firm in China are enjoying the convenience of working remotely through a security solution provided by Check Point Software Technologies.
Veronica C. Silva |
14 Jul |
Read more
A Minnesota man has been sentenced to 18 years in prison after he hacked a neighbor's Wi-Fi <a href="http://www.networkworld.com/news/2009/120909-network-router-cheat-sheet.html?ts0hb&story=rtrcheat">router</a> and then launched a vengeful two-year campaign to frame them with child pornography and threats to government officials, including Vice President Joe Biden.
John Cox |
14 Jul |
Read more
A new feature from Google for Google Voice takes the power of the "Report Spam" button and multiplies it exponentially. Google is applying the collected data from thousands of <a href="http://www.pcworld.com/businesscenter/article/204220/gmail_voice_promises_affordable_calling.html">Google Voice users</a> to automatically identify telemarketers and other unwanted calls and send them directly into the spam folder.
Tony Bradley |
14 Jul |
Read more
Google should urgently overhaul the weak application vetting that has allowed a clutch of bogus apps to sneak onto user's phones through the Market and third-party sites, the CEO of banking security specialist Trusteer has warned.
John E Dunn |
13 Jul |
Read more
IT and security managers are slowly embracing the growing number of <a href="http://www.csoonline.com/article/618163/how-to-adopt-consumer-tech-for-efficiency">consumer devices</a>, such as iPhones and <a href="http://m.csoonline.com/article/686040/iphone-and-ipad-security-4-tips-to-stay-safe">iPads</a>, that are being used by workers within their organizations, but many enterprises are still overwhelmed by the need to mitigate risk and support the devices. That is the finding of new research released Tuesday by Unisys Corporation. The study was conducted for Unisys by International Data Corp.
Joan Goodchild |
13 Jul |
Read more
The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world.
In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.
Liam Tung |
12 Jul |
Read more
Are you worried about all the ruckus over the Jailbreakme.com 3.0 vulnerability for your iPhone and iPad? While you're waiting for Apple to come out with a fix, there are a few safety precautions you can take.
Tom Kaneshige |
12 Jul |
Read more
Security researchers have found more malicious Android apps on Google's official download site and being spread through Chinese app stores.
Gregg Keizer |
12 Jul |
Read more
Code that exploits two iPhone flaws to allow people to jailbreak their devices could, ironically, force security-conscious users to use the vulnerabilities to jailbreak their own iPhones and apply a third-party patch.
Robert Lemos |
09 Jul |
Read more
News Corp. will close its weekly U.K. newspaper News of the World amid allegations that the tabloid hacked into the mobile voicemail accounts of celebrities, the British royal family, and crime victims.
Grant Gross |
08 Jul |
Read more