celebrex max daily dose

Monthly Archives: September 2011

Hackers using QR codes to push Android malware

The growing popularity of Quick Response (QR codes) on smart phones has officially become a new distribution vehicle for malware on Android devices. According to security researchers at Kaspersky Lab (important disclosure: my employer), hackers are are using QR codes

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Mobile malware, "whaling" top challenges of 2011, says IBM report

An unprecedented number of successful attacks on corporate networks in the first half of the year illustrates that “basic network security is not just a technical problem, but rather a complex business challenge,” according to the “IBM X-Force 2011 Mid-year

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

IBM Helps Organizations Increase Security of Mobile and Instrumented Devices Smartphones, ATMs and Beyond The Special …

IBM Helps Organizations Increase Security of Mobile and Instrumented Devices Smartphones, ATMs and Beyond The Special 30-day Free Trial Offer Starts Today           IBM today announced new software, Tivoli Endpoint Manager that integrates the assets acquired with BigFix into IBM’s growing

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Android flaw can disable, corrupt AV tools

Consumers using Android-powered devices will have another security risk to contend with after a security expert pointed out that a “component” within the operating system (OS) can be exploited to disable installed antivirus software, even corrupting the software to become

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Mobile malware is on the rise, warns IBM report

Malware targeting mobile devices is on the rise and is raising new security concerns for IT departments, according to IBM’s X-Force 2011 mid-year trend and risk report. The study said the bring-your-own-device (BYOD) model, which allows employees to use personal

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

For hackers, cellphone is the next lock to pick

SAN FRANCISCO: Hackers have broken into the cellphones of celebrities like Scarlett Johansson and Prince William. But what about the rest of us, who might not have particularly salacious photos or voice messages stored in our phones, but nonetheless have

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

IBM X-Force: Mobile devices are a fast growing target of malware

Look for double the mobile exploits this year vs. 2010 and particularly watch out for mobile applications that are really malware, says IBM’s X-Force security research team. Those are two warnings from the “X-Force 2011 Mid-Year Trend and Risk Report“,

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

IBM X-Force: Mobile devices are a fast growing target of malware

<!—-> Look for double the mobile exploits this year vs. 2010 and particularly watch out for mobile applications that are really malware, says IBM’s X-Force security research team. Those are two warnings from the “X-Force 2011 Mid-Year Trend and Risk

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

2011 a ‘watershed’ year for security breaches – IBM report

The company’s X-Force 2011 Mid-Year Trend and Risk Report, released today, unsurprisingly draws attention to the large number of cyber attacks and network compromises that have come to light so far this year. Targets ranged from Sony, RSA and Nintendo

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

IBM X-Force Report Reveals Mobile Security Exploits to Double in 2011

SymbolPriceChangeIBM179.17+1.62{“s” : “ibm”,”k” : “a00,a50,b00,b60,c10,g00,h00,l10,p20,t10,v00″,”o” : “”,”j” : “”} ARMONK, N.Y., Sept. 29, 2011 /PRNewswire/ — IBM (NYSE: IBM) today released the results of its X-Force 2011 Mid-Year Trend and Risk Report, which demonstrates the rapidly changing security landscape characterized

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,