Mobile phones will become an increasing menace to network security that could drop malware onto protected devices when they dock to sync or plug into USB ports to charge, security experts say in a Georgia Tech report. Compromised phones will infect computers they may plug into for otherwise legitimate reasons,…
Devices That Can Listen In on Cellphone Traffic, Control Your Phone
Law enforcement and military officials are increasingly using devices to locate people via their cellphones, even when the phones aren’t in use. But finding people isn’t all that this type of gear can do View full post on cellphone security – Yahoo! News Search Results View full post on National…
Android devices are growing target of malware, says IBM
Mobile exploits have doubled this year as opposed to 2010 and we should particularly watch out for mobile applications that are really malware, says IBM’s X-Force security research team. Those are two warnings from the “X-Force 2011 Mid-Year Trend and Risk Report“, which says that mobile application markets are a…
Malware for Mac and mobile devices is on the rise
Many Mac users believe that Mac OS is not vulnerable to malware, said Catalin Cosoi, Head of Online Threats Lab at security firm Bitdefender, in an interview with Macworld. It’s true that Windows users are much more at risk than Mac users, with just a couple of hundred samples of…
Managing Mobile Devices: 10 Lessons Learned, via Forrester
Modern CIOs and their IT department face a new, complex set of mobile device security and manageability challenges as employees bring in their various smartphones and tablets to the workplace, and as additional devices are rolled out across the enterprise. Many IT managers are looking to outside MDM (mobile device…
Managing Mobile Devices: 10 Lessons Learned, via Forrester
Modern CIOs and their IT department face a new, complex set of mobile device security and manageability challenges as employees bring in their various smartphones and tablets to the workplace, and as additional devices are rolled out across the enterprise. Many IT managers are looking to outside MDM (mobile device…
SpyEye malware toolkit hits Android devices
The SpyEye malicious toolkit, which has made botnets out of computers running Microsoft’s Windows operating system, now threatens devices running Google’s Android as well. Computer security firm Sophos said SpyEye, designed to steal banking credentials and confidential data, appeared to make the Android version some months after “competitor” Zeus did…
SpyEye malware tookit hits Android devices
The SpyEye malicious toolkit, which has made botnets out of computers running Microsoft’s Windows operating system, now threatens devices running Google’s Android as well. Computer security firm Sophos said SpyEye, designed to steal banking credentials and confidential data, appeared to make the Android version some months after “competitor” Zeus did…
Don’t leave thumb drives or other small devices lying around
View full post on SANS Institute Security Awareness Tip of the Day View full post on National Cyber Security
GreenPois0n 4.3.4 iOS! Jailbreak Released! All Devices iPad 2 iPhone 4, 3GS, 3G
GreenPois0n New Download: is.gd – Windows Hello I am giving you Greenpois0n Jailbreak 4.3.4 !!!!. Its Final version. All instructions inside July 2011 Jailbreak iOS 4.3.4 iPod Touch 4 iPod Touch 2G 3G New iPod Touch iPhone 4 3G 3GS iPad iPad 2 firmware greenpoison released shATter exploit Extra Tags:…