Smartphone security risks and best practices research

Smartphone security risks and best practices research


Smartphone security risks and best practices research

Posted: 16 Sep 2010 06:38 AM PDT

ENISA is looking into smartphones and determining best practices for their use while researching the risks. Several manufacturers have been involved: RIM, Google, Microsoft, Nokia, and others, but the...

80% of network attacks target web-based systems

Posted: 16 Sep 2010 06:02 AM PDT

2010 has brought the use of the Internet for conducting business to an all-time high; however, attacks continue to strike networks more than ever by using sophisticated techniques. Employee use o...

Mobile tracking, remote phone locking and data wiping

Posted: 16 Sep 2010 04:49 AM PDT

Spare Backup launched Spare Mobile Security, a suite of software tools that provide users the means to remotely manage their mobile device. The suite includes five features: Locate my Phone, Message m...

Facebook is the top source for malware infections

Posted: 16 Sep 2010 04:38 AM PDT

The use of social networking during working hours is common (77% of employees do), and consequently, 33% say they have been infected by malware corporate network that has been distributed by these com...

How bad are the web bad guys?

Posted: 16 Sep 2010 04:29 AM PDT

As the bad guys look for new ways to exploit holes in technology, they have become increasingly financially motivated, with organized crime picking up where the 'hobbyist hacker', doing it for kicks, ...

Secure file transfer with StuffIt Deluxe 2011

Posted: 16 Sep 2010 04:07 AM PDT

Smith Micro released StuffIt Deluxe 2011 for the Mac, which introduces StuffIt Destinations, a new drag-and-drop toolbar application designed to help users securely transfer files. For users look...

Apple patches QuickTime for Windows

Posted: 15 Sep 2010 11:49 PM PDT

Apple released QuickTime 7.6.8 that patches two vulnerabilities affecting Windows 7, Vista, XP SP2 or later. An input validation issue exists in the QuickTime ActiveX control. An optional parameter...

Social engineering definitely a massive threat

Posted: 15 Sep 2010 09:15 PM PDT

A report by Social-Engineer.Org reveals some alarming information regarding a DEFCON CTF contest which included targets such as BP, Shell, Apple, Google, Microsoft, Cisco Systems, Proctor and Gamble, ...

Run Nessus on your iPhone

Posted: 15 Sep 2010 09:03 PM PDT

Tenable released an iPhone application for its Nessus Vulnerability Scanner, providing Nessus users the ability to remotely connect to a Nessus server, launch scans and review reports with the Apple i...

0 comments:

Post a Comment