Latest Social Media News
112.9K views | +2 today
Follow
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Heartbleed Detector - Android Apps on Google Play

Heartbleed Detector - Android Apps on Google Play | Latest Social Media News | Scoop.it

Trend Micro Heartbleed Detector scans your ANDROID mobile device for possible risk and helps you stay away from the Heartbleed bug.What does Heartbleed Detector check on yo...


Via Gust MEES
Gust MEES's curator insight, April 17, 2014 9:08 AM

Trend Micro Heartbleed Detector scans your ANDROID mobile device for possible risk and helps you stay away from the Heartbleed bug.



Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Another iOS 7 lockscreen hole opens up - call anywhere in the world for free!

Another iOS 7 lockscreen hole opens up - call anywhere in the world for free! | Latest Social Media News | Scoop.it
Another iOS 7 lockscreen bypass has surfaced: this one lets you call anywhere in the world for free.

OK, not really "for free" - someone has to pay, and that's the owner, who probably assumed th...

Via Gust MEES
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Infosecurity - Apple iOS 7: A Security Overview

Infosecurity - Apple iOS 7: A Security Overview | Latest Social Media News | Scoop.it
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | Latest Social Media News | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 


Via Gust MEES
Gust MEES's curator insight, July 30, 2013 4:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 4:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Latest Social Media News | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.

Via Gust MEES
Gust MEES's curator insight, July 7, 2013 5:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 5:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

   Clueful   -   Privacy Monitoring App for iPhone & Android

   Clueful   -   Privacy Monitoring App for iPhone & Android | Latest Social Media News | Scoop.it

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | Latest Social Media News | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...

Via Gust MEES
Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Gust MEES's curator insight, April 14, 2013 9:25 AM

 

Awareness and Protection!!!


Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Don't you just love mobile apps? So do malicious code writers

Don't you just love mobile apps? So do malicious code writers | Latest Social Media News | Scoop.it
There are some surprising numbers available that tell a dark story about mobile apps and what they can be doing on your device.

 

By now you've read about malicious apps that leak privacy data, but do you realize how serious it really is? If not, you'd better pay attention to the following statistics gathered by Symantec*. And if you think that Google Play is 100% safe, it isn't. I have some data that yields some shocking results about the number of malicious apps waiting to grab your data.

 

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 


Via Gust MEES
Gust MEES's curator insight, March 4, 2013 11:06 AM

===> Unfortunately, the playing surface for Internet naughtiness has changed in the past couple of years and you need to know that it's only getting worse. <===

 

Check also:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

alistairm 's curator insight, March 5, 2013 3:35 AM

Oh dear - the world of technology seems to be one step forward two steps back but these issues are important especially of we are going to be using mobile devices in education and promoting BYOD approaches.

alistairm 's comment, March 19, 2013 4:39 AM
Thanks all
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | Latest Social Media News | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | Latest Social Media News | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | Latest Social Media News | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

McAfee Mobile Security gets additional privacy features

McAfee Mobile Security gets additional privacy features | Latest Social Media News | Scoop.it

To stay safe from malicious apps, users should research apps and their publishers thoroughly and check the ratings before installing. They should also purchase their apps from a well-known reputable app store market, watch for permissions (stay away from installing apps that don’t look right) and install antivirus software on their phone.

 

McAfee announced enhancements to its McAfee Mobile Security software, providing Android smartphone and tablet owners with additional privacy features that help them ensure apps are not ===> accessing their personal information without their knowledge <===

 

Read more:

http://www.net-security.org/secworld.php?id=13470&amp;amp;amp;utm_source=dlvr.it&amp;amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

10 BYOT / BYOD Back to School Basics

10 BYOT / BYOD Back to School Basics | Latest Social Media News | Scoop.it

Gone are the days where students sit neatly in rows all prepared with the same back to school supplies ready to consume instruction. As the 2012/13 school year approaches, one thing is clear. One-size-fits-all is out and personalization is in. This doesn’t only apply to the classroom instruction, it also applies to the mobile devices your students choose to use for learning.

 

===> Today student choice = personalization. The teacher sets the learning goals, but students choose their own tools or learning. <===

 

Gust MEES: Don't forget about IT-Security and be aware of the malware! "Nobody is Perfect!", so ALL "OS" are vulnerable and especially smartphones and any other device connecting to Internet also! And there are also a lot of Apps around who are malicious...

 

===> Take care and as teacher and educator take your ===> responsibilities <=== to educate your learners of the dangers of Internet and How-To protect best! <===

 

In 21st Century while using "Bring Your Own Device" (Hashtag for Twitter = #BYOD) there is a MUST to know about basic IT-Security knowledge! The teachers role is NOT anymore to be the MOST important person, but the LEARNER!

 

So the teacher needs to have that basic knowledge to share it with its learners and to try to keep a safe Learning Workspace... Online and Offline, in the "internal learning network" and also in the "external learning network"!

 

As Teachers, Educators and Instructors we have to deal with Apps, OpenSource software, Freeware, different OS devices, so we need to know about the risks and dangers! We need to know how to get protected these devices also!

 

It's not ONLY the IT-Admin's responsibility, IT-Security is the responsibility of ALL of us!!!

 

Check also:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

  

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

  

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

  

- http://www.scoop.it/t/ict-security-tools

  

- http://www.scoop.it/t/securite-pc-et-internet

 

 

                         ===> Be aware of the malware! <===

 


Via Gust MEES
EdTechSandyK's comment, August 3, 2012 12:13 PM
When I rescooped your post, I did not realize I was erasing someone else's comments. I thought I was just cleaning up extra-text that had been auto-inserted at some point. I was also concerned that there was a malware warning included in what I thought was auto-generated text; I did not want to keep links with the post that might spread malware.

I am still learning about the ins and outs of ScoopIt; it is unfortunate that you jumped immediately to the conclusion that I was censoring you because that was not my intention. Per your request, I will remove the re-scoop post my topic, since I now understand the comments were inserted by a user but do not want to share links that might include malware. Thank you for contacting me. I apologize for my unintended offense.
Gust MEES's comment, August 3, 2012 12:18 PM
Hi Sandy,

OK, everything alright now. My apologies for having reacted also that way, but when it is about Censorship of my own text...

Concerning "malware", You don't have to fear about my links, just have a look at my profile on the bottom of my free IT-Security courses (links above in the text) and You will understand that they are secure ;)

Have a great day,
Gust
Gust MEES's comment, August 3, 2012 12:25 PM
Hi Sandy,

It is important that learners get told how to protect their BYOD-Devices and to know also about the dangers with it. So that's why I included thta special text with links. When now someone makes a rescoop of your "rescooped" censored #scoopit then it would:

1.) Not include my original text with advice and links
2.) Other people who will "rescoop" from your #scoopit will also not get that important knoledge

Have a great day,
Gust

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Android App Sells Your WhatsApp Conversations

Android App Sells Your WhatsApp Conversations | Latest Social Media News | Scoop.it
Mobile Threat Monday: Android App Uploads Your WhatsApp Conversations Online

Via Gust MEES
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID

Nobody Is Perfect: Chaos Computer Club breaks Apple TouchID | Latest Social Media News | Scoop.it

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 


Via Gust MEES
Gust MEES's curator insight, September 22, 2013 4:49 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Gust MEES's curator insight, September 22, 2013 4:50 PM

 

The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple's TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.

 

This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.

 

Learn more:


http://www.scoop.it/t/securite-pc-et-internet/?tag=biometrics

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

 

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | Latest Social Media News | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 


Via Gust MEES
Gust MEES's curator insight, August 16, 2013 8:37 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Latest Social Media News | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Researchers warn of “huge” Android security flaw

Researchers warn of “huge” Android security flaw | Latest Social Media News | Scoop.it
Security researchers have discovered a vulnerability that could allow attackers to take full control of most Android smartphones

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.

 


Via Gust MEES
Gust MEES's curator insight, July 4, 2013 6:45 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Gust MEES's curator insight, July 4, 2013 6:48 AM

 

The vulnerability allows hackers to modify an app without breaking its cryptographic signature, according to Jeff Forristal, chief technology officer (CTO) at mobile security firm Bluebox.


Zhao KQiang's curator insight, March 27, 2014 6:52 AM

there is one example of smart phone security. focus on the mobile system Android

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | Latest Social Media News | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.

 

So why is this important? It highlights the reality of the threat landscape.

 

The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.

 

 

 

 

 


Via Gust MEES
Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses | Latest Social Media News | Scoop.it
Security firm Cenzic said it found serious mobile application vulnerabilities, such as dangerous Web service errors, in an analysis of the mobile apps it reviewed in 2012.

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 


Via Gust MEES
Gust MEES's curator insight, March 7, 2013 5:49 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's curator insight, March 7, 2013 5:52 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | Latest Social Media News | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Mobile app downloads doubling, privacy & identity risks rise

Mobile app downloads doubling, privacy & identity risks rise | Latest Social Media News | Scoop.it
Mobile app downloads are doubling and the apps are getting “smarter”, but the cost to users may well be a threat to their privacy and the potential sh...

 

“While these apps make our lives easier, they also give a wider group of application developers and advertising networks the ability to collect information about our activities and leverage the functionality of our devices.

 

According to Hoffman, more concerning is that many apps collect information or require permissions unnecessary for the described functionality of the app. He says this is not the first time this issue has surfaced, with reports of popular apps collecting irrelevant information or transmitting data when devices are turned off leading to significant backlash.

 

===========================================

 

Gust MEES

 

Check out also my curation:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

http://gustmees.wordpress.com/2012/11/05/naivety-in-the-digital-age/

 

===========================================

 

Read more, a MUST:

http://www.itwire.com/it-industry-news/market/57270-mobile-app-downloads-doubling-privacy--identity-risks-rise

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

iPhone 4S Falls at Hacker Contest; New iPhone 5 Vulnerable to Same Exploit

iPhone 4S Falls at Hacker Contest; New iPhone 5 Vulnerable to Same Exploit | Latest Social Media News | Scoop.it
Two Dutch researchers successfully hacked a patched iPhone 4S, exploit a vulnerability also likely present in the new iPhone 5 due to be released tomorrow.

 

Joost Pol and Daan Keuper won the mobile Pwn2Own contest yesterday at EUSecWest event in Amsterdam by compromising a fully patched iPhone 4S device and stealing contacts, browsing history, photos and videos from the phone.

 

The pair was able to build an exploit for a vulnerability in WebKit to beat Apple's code-signing features and the MobileSafari sandbox. The same bug is present in the iOS6 Golden Master development code base, meaning iPhone 5 is vulnerable to the same exploit. Apple iPads and iPod Touch devices are also vulnerable, Pol and Keuper said, adding that it took them three weeks find the flaw and write an exploit.

 

Read more, a MUST:

http://threatpost.com/en_us/blogs/iphone-4s-falls-hacker-contest-new-iphone-5-vulnerable-same-exploit-092012

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Toronto study shows mobile spyware's long shadow

Toronto study shows mobile spyware's long shadow | Latest Social Media News | Scoop.it
(Phys.org)—Spyware sold legally can infect BlackBerrys, iPhones, and other mobile devices, according to a study from two security researchers at the University of Toronto Munk School of Global Affairs' Citizen Lab.

 

Gust MEES: NOBODY IS PERFECT!

 

Read more:

http://phys.org/news/2012-09-toronto-mobile-spyware-shadow.html

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Sophos helps businesses embrace BYOD

Sophos helps businesses embrace BYOD | Latest Social Media News | Scoop.it

“BYOD is top of mind for myriad organisations; however, it’s causing some concern among IT. The increase in personal devices accessing the network may complicate the process of ensuring devices are secure and compliant with company policies, making it difficult for IT to justify broad BYOD acceptance,” said Stacy K. Crook, senior analyst, Mobile Enterprise Research, IDC. “Solutions with features like those found in the latest version of Sophos Mobile Control allow organisations to develop BYOD strategies without compromising on security, or complicating the overall management of the network.”

 

In addition, if it a mobile device becomes non-compliant, the new release will alert IT, so the administrator can send messages to the user for minor violations. For more serious incidents, the administrator can configure a set of tasks, which will be applied automatically. Examples include corporate or full wipes as well as policy changes to avert any risk for corporate data.

 

Gust MEES: a MUST read for anyone who uses "Bring Your Own Device" (Hashtag for Twitter =#BYOD):

http://www.net-security.org/secworld.php?id=13423

 


Via Gust MEES
No comment yet.