iPhone security, Part 1 Perhaps the biggest security problem of mobile phones is that they are easily lost or stolen. Unless a lost/stolen phone has been protected (by its rightful owner) from unauthorized use, then anyone who finds this phone could, in theory, access it with the same rights and privileges as the original owner. But what are the security issues when the phone stays in the possession of its rightful owner? This article considers just one popular case: The Apple iPhone, although most of what applies to iPhones also applies to a related Apple product, the iPod touch. Once upon a time, gadgets in bed meant kinky not nerdy Survey results out this morning are not exactly shocking in that they show smart phones and laptops have joined bread crumbs and toenail clippings as a major source of marital friction in the bedroom. But maybe some of this should be shocking. Almost half the respondents (44%) admitted they are holding important work documents on their mobile devices of which 54% were not adequately secured with encryption. ... Additionally snooping neighbors or even malicious infiltrators could hack into the devices that are being used in bed, as a fifth of people are not using a secure wireless network as they busily tap away under their duvets. Arbor adds ATLAS capabilities to latest Peakflow edition Network security vendor Arbor Networks has integrated its ATLAS Internet monitoring system into the latest edition of its Peakflow security system. Arbor's Peakflow SP 5.0 aggregates and analyzes data to provide network operators with information on network behavioral attack patterns from threats such as botnet sites, phishing sites and worms. Cloud management wares on display at Interop; Security budgets shrinking, survey says A handful of vendors this week at Interop are debuting new and upgraded products designed to help monitor application performance and IT service delivery in cloud computing environments. Also, a new survey of information security officers in the high-tech, media and telecom sectors shows that 32% are facing reduced information security budgets. |
No comments:
Post a Comment