Thursday, September 30, 2010

Many Android apps leak user privacy data

MIT researchers tout network intrusion recovery system | IE users most at risk from DLL hijacking attacks

Network World Security

Forward this to a Friend >>>


Many Android apps leak user privacy data
Researchers have created Android-based code that tracks what applications on a smartphone actually do with the data they have access to. They do a lot, it turns out, and most of what they do is unknown to the enduser Read More


WHITE PAPER: NetApp

Storage for Windows Environments
This paper discusses how consolidating your Microsoft SQL Server, Exchange, and SharePoint Server data along with your Windows files using NetApp storage for Windows environments reduces the cost of physical storage as well as ongoing management costs in Windows environments. Read More!

WHITE PAPER: NetApp

Get Storage Efficiency and Data Protection
This paper will show how NetApp storage efficiency and data protection features allow for a higher level of protection without compromise on risk or cost. Read now!

MIT researchers tout network intrusion recovery system
MIT researchers say RETRO will make recovery from system hacks easierMIT Computer Science and Artificial Intelligence Laboratory researchers will next week detail a system they say will make it easier for companies to recover from nasty security intrusions. Read More

IE users most at risk from DLL hijacking attacks
Users of Microsoft's Internet Explorer are more vulnerable to rogue DLL attacks than people who use rival browsers such as Mozilla's Firefox or Google's Chrome, a security researcher said today. Read More

How to secure a new PC
The excitement of discovering the capabilities of a new PC can lead you to forget the importance of security. Our new PC safety guide offers step-by-step instructions for protecting your machine. Read More


WHITE PAPER: NetApp

Read More!
ESG Whitepaper talking about Windows Data Consolidation in Mid-Sized Virtual Server Environments. This paper focuses on the challenges of virtualizing Windows environments and the need to consider network storage as a part of the overall solution. NetApp and VMware's joint solution is also examined in detail. Read now!

Worlds collide: Apple iPhone app manages mainframe
IPhone, iPad apps manage IBM mainframe systemsTalk about two systems that are worlds apart. Network management vendor William Data Systems says it has created an Apple iPhone app that lets users manage IBM's z/OS mainframe environment. What's up with encryption? Read More

The shape of threats to come
Mark Gibbs ponders the uber malware called Stuxnet. Read More

ZeuS botnet has a new use: Stealing bank access codes via SMS
The latest criminal activity linked to the ZeuS botnet is a software package tailored to BlackBerry and Symbian mobile phones and that picks off SMS messages, apparently to break the two-factor authentication that mobile bank customers use to access their accounts, researchers says. Read More


WHITE PAPER: IBM

Protecting Sensitive Data in Non-Production Environments
The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These techniques must produce results that accurately mask context-sensitive data and include a way to propagate masked data elements consistently across applications and operating environments. Read now

Microsoft Strengthens Security for Hotmail
Microsoft is tackling the growing issue of Hotmail account hijacking. Microsoft has introduced new security controls designed to help users better protect Hotmail passwords and recover compromised accounts more easily. Read More

Android software piracy rampant despite Google's efforts to curb
Pirating Android apps is a long-standing problem. But it seems to be getting worse, even as Google begins to respond much more aggressively. The dilemma: protecting developers' investments, and revenue stream, while keeping an open platform. Read More

Why CIOs are Resetting Information Security Priorities
Business partners with shoddy information security. Cloud computing vendors with dubious risk controls. What's a CIO to do? Our annual Global Information Security Survey tracks the trends. Read More

Crypto Wars: EFF Urges Us To Stand Up and Defend Privacy
Privacy watchdogs are growling as the Feds plan government-mandated back doors in encryption software and all communications systems. The "war on privacy" reached a new level as the EFF proclaimed it's time for all of us who care about privacy to stand up and defend it. The disturbing news today is that the government intends to expand its ability to surveill us by putting government-mandated back doors in all communications systems and in all encryption software. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Texting while driving bans don't work, study finds
  2. Microsoft issues emergency patch for Windows Web bug
  3. Kindle owners rich, iPad owners young and male
  4. At long last, Obama highlights IPv6 issue
  5. Cisco eats its own IPv6 dog food
  6. Crypto wars: EFF urges us to stand up and defend privacy
  7. HP replaces its Cisco core
  8. Fed's IPv6 plan called a "game changer"
  9. Google is world's most attractive employer; Microsoft drops to No.7
  10. Cisco expects BlackBerry PlayBook tablet to do well

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment