 | Getting started with power-line networking Power-line networking makes use of your electrical lines to give you a de facto wired network. It gives you the range of a wired network without any of the mess or the need to run cable behind the walls. Read More WHITE PAPER: Box
2014 Aragon Research Globe for Mobile Content Management Mobile devices are changing the way content is accessed, shared and managed. Aragon Research introduces its first Globe for mobile content management and evaluates 19 major MCM providers. View now WHITE PAPER: OutSystems
Why IT Struggles with Mobility This paper chronicles the adventures and misadventures of the enterprise mobile app journey based on our observations working with industry leaders who have weathered three years of pain to arrive at the same conclusions. Learn More 11 technologies Apple has killed Apple has pushed many technologies to extinction in favor of embracing new trends. Read More Smartphone encryption What does it mean to you? Why are legislators considering going to Congress for access to our cell phones? Read More Adobe can now send customized messages to beacon apps The company is hoping its customers will use analytics features to prevent messaging fatigue. Read More Why your app should offer a free trial New research shows that, in theory, alternative app pricing schemes, such as pay-per-use and free trial periods, could make both consumers and producers happier Read More Mobile payments to tally just 1% of all U.S. consumer spending in 2019 Forrester Research threw something of a wet blanket on mobile payment growth, calling it an "evolution not a revolution." Read More Why it sometimes makes sense to go slow with mobile development At Westinghouse, developers work slowly and steadily to avoid bugs in mobile apps used for testing the nuclear power plants that the company builds for electricity providers around the world. Read More WHITE PAPER: CommVault
5 Steps to Application-Aware Data Protection Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create application-aware protection. Learn More>> NotCompable sets new standards for mobile botnet sophistication The NotCompatible mobile malware has reached a new level of sophistication, according to a new report from San Francisco-based mobile security company Lookout, Inc.The malware was first detected in 2012, but the newly discovered variant, NotCompatible.C, is the most complex mobile malware the company has ever seen.NotCompatible's writers have rebuilt the entire back end to make it particularly resistant to malware researchers trying to take them down, with multiple servers in different geographies a separate node authentication process, and encryption of all their traffic.Then there's the peer-to-peer functionality."Even if one or two command-and-control servers go down, bots can get commands to each other by funneling them through other bots," said Linden.This is new for the mobile malware arena, he said.However, it is reminiscent of the Conficker PC botnet, which also used peer to peer and encryption and was extremely difficult to take down. Conficker was first detected in 2008, an infected up to 15 million computers around the world. Today, according to the Conficker Working Group, there are 995,481 unique IP addresses that show signs of infection, a sign of how difficult it is to root out.So far, the company has only spotted the malware on Android devices, not iOS or Windows, and is mostly targeting victims in the United States."The US IP address is kind of like being in a privileged zip code in terms of what these guys are looking to do," he said. "Since they're looking to by pass anti-fraud mechanisms on things like Ticketmaster, they will look less suspicious if they come from US IP addresses."The malware create a mobile botnet that is currently being used to bypass anti-fraud mechanisms on Ticketmaster, for spam, for brute-forcing passwords, and for scanning the Internet for vulnerable web servers, said Senior Security Product Manager Jeremy Linden, who was the lead researcher on the report.More than 4 million people have downloaded the malware since the beginning of the year, he said, though there's a separate step to actually install it, which might result in a lower actual rate of infection.However, the installation step masquerades as an Android system update."The dialog doesn't look exactly like an Android system update, but a user might not know what an Android system update looks like," he said.The malware first gets on a phone when a user clicks on a link in a spam email where a site asks them to download it, or drive-by downloads on previously trusted sites, he said.NotCompatible.C is a potential threat to enterprises, as well, since it opens a proxy on a smartphone that attackers could funnel traffic through if employees bring infected phones to work and use them to access corporate networks."We haven't seen NotCompatible used to bypass network protections yet," said Linden. "But it's a very tempting opportunity for these attackers or other attackers that could use similar methodologies."In addition the attackers are able to make traffic look like its coming from the infected phone, and can access anything that the phone can access."We recommend that enterprises make sure their employees run some kind of mobile security product to protect against this threat," said Linden. "And also that networks be segmented, so that less trusted devices like phones don't have the same level of access as devices that stay at the enterprise, and aren't moved around, and are only used for work purposes."To read this article in full or to leave a comment, please click here Read More LAST CHANCE: Enter to win a copy of "Responsive Mobile Design: Designing for Every Device" We've got 5 copies to give to some lucky readers. Enter now for your chance to win! Read More AMD tablet development stalls as priorities change AMD is assigning more resources to products that can help the company make money. Read More Android Lollipop's default encryption devastates storage performance, tests show Is your new Nexus 6 not as snappy as it should be? The default encryption feature may be to blame. Read More How to attract digital natives to buy at retail stores Those 18- to-25-year-olds are a savvy bunch. They window shop at retail stores only to bargain-hunt online. They research products on their smartphones while walking the aisles. Retailers that want them to buy at brick-and-mortar stores better get personal or digital natives will walk. Read More 12 free Android, iOS apps for holiday shopping 'Tis the season to be shopping, and these 12 Android and iOS apps will not only save you money, they'll save you from the stress of holiday bargain hunting. Read More How to set up 802.1X client settings in Windows 802.1X provides security for wired and Wi-Fi networks. Read More |  |
| | NOVEMBER GIVEAWAYS Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!
Effective Ruby: 48 Specific Ways to Write Better Ruby If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!
Responsive Mobile Design: Designing for Every Device Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now! INSIDER Get exclusive access to premium articles, product guides, reviews and more.
- 8 tech buzzwords that you need to know - Free and cheap ways to learn about network administration - IT resumes: Lies, half-truths and embellishments SALARY SURVEY What's your earning power? How does it compare with your peers'? With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now! |
| | Get more peer perspective online Google+ | LinkedIn | Facebook | Twitter You are currently subscribed to itworld_wireless_strategies as garn14.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com
When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information. To contact ITworld, please send an e-mail to online@itworld.com. Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701. ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com. | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.