Search This Blog

Thursday, September 20, 2012

The 10 most common mobile security problems and how you can fight them

RSA looks have SIEM do advanced real-time threat analysis, forensics | Legal hurdles threaten to slow FBI's 'Rapid DNA' revolution

Network World Security

Forward this to a Friend >>>


The 10 most common mobile security problems and how you can fight them
When it comes to security, most mobile devices are a target waiting to be attacked. That's pretty much the conclusion of a report to Congress on the status of the security of mobile devices this week by watchdogs at the Government Accountability Office. Read More


WHITE PAPER: BMC Software

Lumen 21 Transforms their IT Help Desk with Remedyforce
View how a cloud-based service desk replaced an inefficient, manual, on-premise system and delivered substantial gains in customer satisfaction, support team productivity, and mean time to resolution. Learn More.

WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

RSA looks have SIEM do advanced real-time threat analysis, forensics
RSA is readying a product it calls Security Analytics whose purpose is basically to transform the company's traditional security information and event management (SIEM) product, EnVision, into a hunter of stealthy attackers, and a forensics tool to analyze attacks. Read More

Legal hurdles threaten to slow FBI's 'Rapid DNA' revolution
It's history being made -- the FBI just this month took acceptance of its first-ever "Rapid DNA" equipment for near-instant DNA analysis in the field. But use of this DNA analysis-in-a-box, which can be carried around and connected to the Internet, may be slowed because current law never envisioned such analysis being done for law-enforcement purposes outside an accredited lab. Read More

Cybercrime-fest targets mobile devices
The lineup of depressing security stats in a recent report by the Government Accountability Office on the mobile devices is growing. Let's see: Read More


WHITE PAPER: Dell and VMware

Nothing nebulous about cloud computing benefits
Data center virtualization and consolidation clear the path toward private, public and hybrid cloud computing environments. Whether enterprises take a revolutionary or evolutionary approach, understanding IT infrastructure options is the first step. Learn More

Hackers exploit 0-day: Kick IE to the curb or catch a nasty Poison Ivy itch?
Do you use Internet Explorer 6, 7, 8 or 9? If so, then you might catch a nasty itch since malicious hackers are using those IE browsers "to install the Poison Ivy Trojan—malware that can steal data or take remote control of PCs," the BBC warned. This new zero-day can potentially infect "hundreds of millions" of IE browsers. Read More

Security startup isolates untrusted content in virtual machines
Security-software startup Bromium is shipping its first product, a virtualization client that runs any untrusted content inside its very own virtual machine -- a microVM -- protecting the underlying operating system and whatever content is stored on the physical machine from theft and malware infection. Read More

How to find happiness in a world of password madness
In early August, Wired reporter Mat Honan had his most precious passwords hacked via a complex series of social engineering exploits. The breach made headlines because it exposed security flaws in Apple and Amazon customer service policies; but let's not forget that the Honan saga capped a long summer full of server invasions that exposed millions of user passwords en masse. Read More


WHITE PAPER: Riverbed

CIO's Guide to Advanced Consolidation
Consolidating IT infrastructures is a continuing trend, particularly in an uncertain economy with organizations looking to reduce costs. Learn more.

FBI eager to embrace mobile 'Rapid DNA' testing
It's been the FBI's dream for years -- to do near-instant DNA analysis using mobile equipment in the field -- and now "Rapid DNA" gear is finally here. Read More

Virgin Mobile USA online subscriber accounts can be easily hacked, developer says
The online accounts of Virgin Mobile USA subscribers are vulnerable to brute force attacks because the company forces customers to use weak passwords on its website, according to a software developer. Read More

Phone numbers are enough to access user accounts on some mobile operator portals
Attackers could impersonate legitimate mobile users on the Web portals many mobile operators use to sell content and services to their customers because of a security flaw in the sites, according to Bogdan Alecu, an independent security researcher from Romania. Read More

Galaxy S3 hacked via NFC at Mobile Pwn2Own competition
The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam on Wednesday. Read More



SLIDESHOWS

TEST: 6 free email servers for small businesses
hMailServer (Windows only) wins our test; Citadel (Linux only) comes in a close second

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Hackers exploit 0-day: Kick IE to the curb or catch a nasty Poison Ivy itch?
  2. Arista looks to ward off Cisco with new low-latency switch
  3. Emoticon to turn 30 despite Penn Jillette's objections
  4. Maybe with help from Google and Adobe, Microsoft can kill Windows XP
  5. iPhone 5 vs. BlackBerry: BlackBerry could still surprise, despite Apple's ascendance
  6. Kaspersky researcher cracks Flame malware password
  7. Oops. OpenStack board member says letting VMware into project was a mistake
  8. Cisco looks to one-up Arista, Juniper with Nexus 3548
  9. iOS 6 arrives: Its 16 key new features
  10. 5 free open source alternatives to Microsoft Office

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: