Visit our other websites:    Consumer IT    On CE    Mobile Channels    ECI news    rAVe Europe    Digital Signage News    

 

eSP - IT Solution Providers in Europe

  • Full Screen
  • Wide Screen
  • Narrow Screen
  • Increase font size
  • Default font size
  • Decrease font size

Security

Android: Mobile Malware's #1 Target

E-mail Print PDF
Android: Mobile Malware's #1 Target

McAfee's Q2 2011 threat report points out Android-based malware is "the most popular target for mobile malware developers," vastly outnumbering attacks on other mobile operating systems. 

Malware attacks on Android outnumber the second placing OS (Java Micro Edition) by over 300%. 


It's interesting to note iOS device malware attacks are so minimal McAffee fails to even report their number. 

Mobile malware numbers in general are steadily on the rise-- with threats targetting exploits, employing botnet functionality and using rootkit features for stealth Read more...

The Gartner Guide to Targeted Attacks

E-mail Print PDF
The Gartner Guide to Targeted Attacks

Advanced targeted threats are on the rise-- and security controls need to evolve against them, Gartner says. 

Targeted attacks penetrate standard security control levels, causing significant businesses damage to enterprises not equipped against them. 4-8% of executibles passing through the average enterprise's antivirus defenses are malicious, according to Gartner. 

Targetted attacks aim to achieve specific impact against specific enterprises, in order to achieve 3 major goals motivated by financial gain:

Denial of service: Disrupting business operations Read more...

Helping With Password Storage

E-mail Print PDF
Helping With Password Storage

One can't always rely on their memory for password storage-- thus your customers should find a secure alternative with Menstecnica's I-Memo and its fingerprint recognition.

The I-Memo is a portable password-storing device smaller than a mobile phone, allowing access to stored passwords via fingerprint verification instead of a  master password.

It stores up to 2000 records (each with PIN, userID, password and other fields) and has a random password and number generator. The device can handle up to x10 different user fingerprints, each with their Read more...

Network Barometer 2011 Results

E-mail Print PDF
Network Barometer 2011 Results

Dimension Data launches its Network Barometer Report 2011, gauging enterprise organisations' networks' readiness to support business securely. 

In evaluating enterprise networks' practices, Dimension Data reports more than 73% of corporate network devices have at least one known security vulnerability-- nearly double the 38% from last year's report. 

One particular higher-risk vulnerability-- PSIRT 109444 (identified by Cisco in September 2009)-- is found in 66% of all devices, and is the cause for the dramatic increase in enterprise device vulnerabilities.  Read more...

Businesses Drive Mobile Security Demand

E-mail Print PDF
Businesses Drive Mobile Security Demand

The mobile device security software market will reach $3.7Bn by 2016, according to Juniper Research-- with enterprise and business sales accounting for 69% of the market. 

Juniper says businesses are spending more on mobile security applications, particularly since enterprise users are "in the front line against security breaches," Juniper says.

Currently less than 1 in 20 smartphones and tablets carry some form of 3rd party security software. 

Recent high-profile security events-- such as the UK's "News of the World" hacking scandal-- are also increasing Read more...

Page 60 of 67