Thursday, August 15, 2013

Cybercriminals use Google Cloud Messaging service to control malware on Android devices

Cybercriminals use Google Cloud Messaging service to control malware on Android devices | USENIX: Researchers propose security that adapts to combat malware that morphs

ITworld Security Strategies

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


Survey: Share your opinions and enter to win $500
$500 for your thoughts? Take our brief survey (under 10 minutes, we promise) and enter the drawing for your chance to win. Read More


RESOURCE COMPLIMENTS OF: Sophos

Sophos Virus Removal Tool
Find and remove viruses, spyware, rootkits , fake antivirus and more. Scan now.

WEBCAST: IBM

Live on 4/23! Happy Customers and a Lower TCO
This webinar provides real world insight into converged systems taken from Oracle production environments. Join us to learn which offerings have the Lowest TCO, Highest Customer Satisfaction and Fewest Security Breaches... and more. Learn More

Cybercriminals use Google Cloud Messaging service to control malware on Android devices
Cybercriminals are controlling malware on Android devices through a Google service that enables developers to send messages to their applications, according to security researchers from antivirus vendor Kaspersky Lab. Read More

USENIX: Researchers propose security that adapts to combat malware that morphs
Software seeks and blocks bot calls to command-and-control servers. Read More

Researchers explore underground market of Twitter spam and abuse
Researchers from the UC Berkeley will present a paper Wednesday at the 22nd USENIX Security Symposium in Washington, D.C., on Wednesday that explores the underground market of spam and abuse on Twitter. Read More


WHITE PAPER: Cisco Systems

The Expanding Role of Mobility in the Workplace
Momentum is growing for corporate mobility--64% of firms say that unleashing employee mobility is a priority. Forrester examines the trends, outlines deployment priorities, and highlights the business benefits of crafting a mobile strategy. Read Now

Next up: The Jamming wars
Personal privacy is going to turn from a "right" to a "fight" in the next decade, as individuals take up (digital) arms against government- and private sector snooping on their personal lives. Read More

Bitcoin wallets upgraded after Android cryptography problem
Several Bitcoin wallet applications have been upgraded following a serious cryptography problem in Android that could allow attackers to steal the virtual currency. Read More

Best advice from sys admins, for sys admins
Sys admins share 9 best practices that were either passed on from expert admins, or they learned in the school of hard admin knocks Read More

Apple finally fixes developer site, takes Ellison's jabs, gets Icahn's support
Apple's developer website is finally fixed after nearly a month of disruption. Then came Oracle CEO Larry Ellison's doomsday prediction on the eve of Apple's big fall product launch, followed by billionaire investor Carl Icahn showering Apple with some love. It's getting crazy in Cupertino. Read More


DON'T MISS...

16 best free apps for your Google Nexus 7

Bypass blocked webpages and paywalls with Google as your proxy server

25 crazy and scary things the TSA has found on travelers

To solve mystery of life on Mars, we should drill, baby, drill

13 fonts to make a programmer smile

BOOK GIVEAWAY

New month, new books! We have 5 copies of each of these hot new titles to give away. Enter the drawings today.

The U.S. Technology Skills Gap
Essential reading for those eager to see America remain a relevant global power in innovation and invention in the years ahead. Consider it your how-to-get involved guidebook.

Scrum Shortcuts without Cutting Corners
Scrum expert Ilan Goldstein helps you translate the Scrum framework into reality to meet the Scrum challenges your formal training never warned you about.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_security_strategies as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.