Wireless / Mobile Security — News
Websites that accidentally distribute rogue code could find it harder to undo the damage if attackers exploit widespread browser support for HTML5 local storage and an increasing tendency for heavy users of Web apps never to close their browser.
Flash Player 11 should fix plenty of security holes, just like Adobe Reader X did a year ago. But Adobe's products will continue to be a target as long as people insist on running obsolete software.
Security researchers say they've uncovered a flaw in several smartphone models produced by HTC that gives any application that has Internet access the keys to a trove of information on the phone, including e-mail addresses, GPS locations, phone numbers, and text message data.
Look for double the mobile exploits this year vs. 2010 and particularly watch out for mobile applications that are really malware, says IBM's X-Force security research team.
IT professionals should stop mocking their users for doing seemingly stupid things like opening phishing emails, according to IBM. These un-patchable people could turn out to be the canary that flags the next Advanced Persistent Threat attack.
Amazon's new Silk browser has raised some eyebrows among privacy and security experts.
A Russian security company has upgraded a phone-password cracking suite with the ability to figure out the master device password for Research in Motion's BlackBerry devices.
Automotive and industrial products company Rema Tip Top Australia has begun the process of a tablet review following the implementation of a new firewall system.
If your company is like most, you've been wrestling carefully with the security protections necessary to manage demand for bring-your-own (BYO) computing policies. You may even work at Suncorp or one of the other organisations, that have embraced the idea as a way to reduce IT costs and boost employee satisfaction.
Development of enterprise mobile apps has been moving more slowly than development of consumer-facing apps, according to Gartner. One main reason is IT leaders' concerns about the security of mobile devices, which are often employees' personal devices, and are vulnerable to being lost, hacked or stolen. While there are plenty of established tools and practices for keeping Web visitors from straying (or hacking) into sensitive corporate data, managing security across a diverse set of mobile devices remains a challenge, IT experts say.
In the last 18-months, the mobile computing landscape has changed completely. People are bringing their own computers to the office and carrying smartphones and tablet devices that are as powerful as desktop computers were only a short while ago. Here’s how to make sure these devices don’t compromise your organisation.
Microsoft has pulled off its third technical and legal botnet takedown, this time aimed at the Kelihos botnet and a domain responsible for the recent spate of MacDefender malware attacks on Mac users.
BoxTone has released a new version of its mobile device management software, which now works with existing enterprise policy-setting and security tools. This integration lets enterprise IT staff apply those tools to mobile users.
BoxTone, an enterprise mobility management software provider, today announced new enhancements to its Enterprise Mobility Management (EMM) platform that are designed to help CIOs, CISOs and other IT managers meet security and compliance regulations while managing large numbers of employee- and corporate-owned mobile devices.
Despite widespread security concerns by smartphone users, 82 per cent do not have any security products installed, a survey by research group NPD has found.
Facebook's new Timeline will make it even easier for criminals and others to mine the social network for personal information they can use to launch malicious attacks and steal passwords, a researcher said today.
There's a new report out highlighting a huge spike in threats against Google's Android platform. It's something to be concerned about. But don't freak out or return your cool new Samsung Galaxy Tab.
Just when you were starting to get ahead of the curve when it comes to locking down the network and protecting PCs, everything went mobile. Not just laptops--but tablets, and smartphones that run unique operating systems and applications on completely different hardware. To help you combat the dramatic rise in mobile security threats, McAfee has developed Enterprise Mobility Management.
Former cybersecurity czar Clarke says smartphones, digital certificates create huge security problems
Former White House cybersecurity adviser Richard Clarke, author of the book Cyber War, served 19 years in the Pentagon, intelligence community and State Department.
There are hundreds of thousands of Android apps, including many that are useful for IT professionals on the job. These apps can help connect to servers, monitor computers, access databases, analyze the airwaves, scan networks, and serve as a reference. Here are 16 of these apps, most of them free.
Sign up now »
In partnership, Newgen provides innovative network monitoring and security solutions based upon Gigamon’s GigaVUE-420 systems.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.