Search This Blog

Thursday, March 03, 2011

Google Yanks 21 Malicious Apps From Android Market, Phones

AT&T loses corporate privacy case, war of "words" | Hackers needed to save the world — at least America

Network World Security

Forward this to a Friend >>>


Google Yanks 21 Malicious Apps From Android Market, Phones
Openness, one of Android's big advantages, can also be the Achilles' heel of the platform. Google has pulled the kill switch on 21 free malware apps from the Android Market and from around 50,000 devices, according to reports. The apps were free illegal downloads of popular apps in the Android Market, repackaged with malware able to steal details from a user's phone. Read More


WHITE PAPER: Polycom

The Total Economic Impact of Microsoft Lync Server 2010
A Forrester Consulting study commissioned by Microsoft found that a composite organization using Lync 2010, with a risk-adjusted ROI of 337%, can achieve net benefits of over $13 million through: direct cost savings from web and teleconferencing, travel cost savings and reduced IT and telephony labor costs. Read now!

WEBCAST: Iron Mountain

Are your PCs and Laptops Recovery and Discovery Ready?
The need for tighter controls on visibility and accessibility to critical data across the network is driving most companies to meet their legal and regulatory mandates and be fully prepared for eDiscovery requirements. Join IDC Program Vice President Laura DuBois to learn how to ensure your PCs and laptops are discovery ready. View Now

AT&T loses corporate privacy case, war of "words"
Definition of "corny" and "personal privacy" at center of finding that could impact public corporate information Businesses are not entitled to the same privacy as people. That was the conclusion of the US Supreme Court yesterday ruling against AT&T that ended up being a discussion of word use and semantics as much as a privacy debate. Read More

Hackers needed to save the world — at least America
A trio of potential nightmares for DHS include cybersecurity, homegrown terrorists and intelligence sharing. Need a job? Sophisticated hackers are needed to fill the cybersecurity gap.According to current and former Department of Homeland Security officials who gathered to celebrate the eighth anniversary of DHS, a trio of potential nightmares for DHS include cybersecurity, homegrown terrorists and intelligence sharing. Read More

VMware Highlights Convergence Security Needs
convergedVMware's recent announcement that it is testing a mobile virtualization client on LG Optimus smartphones running the Google Android operating system highlights the growing need for IT managers to integrate wireline and wireless security and virtualization planning. VMware's move reflects the trend we see in our research of rapidly growing interest in mobile device management to enable IT managers... Read More

Mozilla follows Google, patches Firefox as prep for Pwn2Own
Mozilla on Tuesday fixed 11 security flaws in Firefox, following in rival Google's footsteps in patching its browser before a hacking contest kicks off next week. Read More


WHITE PAPER: Diskeeper

System Reliability Improvements and Benefits with Diskeeper
Over 300 IT managers evaluate Diskeeper on crucial issues that can make or break a site's viability. Read More

Security: Never mind the products, educate the users
If they could change one thing to improve IT security, the assembled experts on a panel at Cebit would better educate their users. Read More

We need to ignite a Layer-1 revolution
Egypt's revolution was heralded as a success story for social media services such as Twitter and Facebook. Western journalists fawned over every rare example of social media, ignoring the more mundane but far more nt communication services such as cellular phone calls and text messaging. The really interesting story out of Egypt, and more recently Libya, Iran and other places was the communications blackouts imposed by each regime. While the west focused on layer-7 technologies, the tyrants were smart enough to strike at the root of their citizens efforts: layer-1 physical layer connectivity for phones. Read More

If Stuxnet was act of cyberwar, is US ready for a response?
The complex Stuxnet worm proved attacks on SCADA and other industrial control systems were possible. Are we ready if one comes our way? Read More

Google yanks over 50 infected apps from Android Market
Google has pulled more than 50 malware-infected apps from its Android Market, but hasn't yet triggered automatic uninstalls of those programs from users' phones, security experts said today. Read More


WHITE PAPER: Trend Micro

VDI Performance Analysis Report
Enterprises wishing to virtualize desktops are likely to use Virtual Desktop Infrastructure (VDI). With VDI each user has access to applications via a thin client, a regular PC, or even a refurbished low performance PC. Learn how this can prevent complications from an individual session failure. Read now!

Helzberg Diamonds tries 'tokenization' for PCI compliance
Jewelry retailer Helzberg Diamonds has struggled to achieve compliance with the Payment Card Industry (PCI) data-security standards, so it is trying a new tactic: technology called tokenization that lets the retailer "hide" sensitive card data in plain sight. Read More

New Palo Alto software enforces security policies on all corporate laptops
Palo Alto Networks is coming out with software that extends its next-generation firewall protection to individual laptops no matter where they are when they tap into business networks. Read More

Healthcare provider prescribes major data-loss prevention program
New Jersey's single largest healthcare provider, Saint Barnabas Health Care System, is rolling out a major data-loss prevention (DLP) initiative that will enforce new content-control restrictions on over 10,000 laptops, tablets and desktop PCs used by its medical staff. Read More

Man gets 7 years for forcing modems to call premium numbers
A New Hampshire man who made US$8 million by installing unwanted dial-up software on computers and then forcing them to call expensive premium telephone numbers was handed down an 82-month sentence on Monday. Read More

Cisco: Facebook security more important as e-mail spam levels drop
Cisco discussed Facebook security, while Websense unveiled a new Facebook anti-spam tool. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

20 awesome tech products at DEMO
Build-your-own iPhone and Android apps, cloud services, photo tools and more on display at DEMO Spring 2011.

Top 10 Chrome OS extensions
Though Google is pitching it as an operating system for netbooks and lightweight notebooks, Chrome OS is essentially the Chrome Web browser bolted on top of a bare minimum version of Linux. The following extensions can improve the user experience of Chrome (OS or browser) to give you some of the functionality found in a traditional operating system.

MOST-READ STORIES

  1. Welcome to the iPad 2: Inside Apple's new tablet
  2. Open source expert takes on the hardest job at Microsoft
  3. Meet Google's human search engine for innovation
  4. Man gets 7 years for forcing modems to call premium members
  5. IE wins, Firefox loses as Internet population shifts
  6. Google apologizes for Gmail bug that shook 150,000 users
  7. Mr. Linux goes Hollywood for the Oscars
  8. 20 awesome tech products at DEMO
  9. PHP user group lauds Microsoft's open source contributions
  10. Windows Live Mesh goes live without support for Linux

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: