celebrex max daily dose

Monthly Archives: August 2012

BYOD mobile workers thumbing nose at IT security

Nearly 25% of mobile workers say they employ some sort of workaround on their smartphones to bypass IT controls and get at corporate data, while 12% of tablet users say they use similar tactics, according to the quarterly iPass Mobile

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

FinFisher Surveillance malware spreads to smart phones

University of Toronto researchers say a commercial cyber-espionage program marketed as a way for governments to spy on criminals is being used for broader surveillance and can now take over a range of smartphones and other mobile computing devices. “People

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Android SMS malware firm fined £50000 and ordered to refund victims

Back in February, a SophosLabs researcher Vanja Svajcer discussed how he had discovered a malicious link on Facebook that led to malware being downloaded onto his Android smartphone. Svajcer analysed the malware, adding detection for it as Andr/Opfake-C, and discovered

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Android Malware Pusher Told To Cough Up £50000

An Android malware dealer has been fined £50,000 and told to refund all the people it duped out of money. UK security firm Sophos discovered some software pushed onto Android phones via a Facebook link earlier this year. Once installed,

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Enterprise mobile security is like a layer cake

With the spread of smartphones in the workplace, enterprise security has had to answer the new needs that arise when devices are always on, always connected, and often used for personal tasks. With these needs in mind, Clutch Mobile has developed products

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Android v. iOS Part 5: Android Is A Two-Legged Stool

RECAP This week we’ve been looking at the Android and iOS mobile operating systems. In part 1, we looked at how Android was dominating market share. In part 2, we looked at how iOS was dominating profit share. In part

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Flowfinity Announces Mobile Solution for NFC Security Guard Tour Verification

Security service providers can enforce route compliance with Flowfinity software on NFC mobile devices Vancouver, BC (PRWEB) August 30, 2012 Flowfinity Wireless Inc., a proven provider of enterprise mobile applications, today announced a software solution that enables security service providers

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

‘FinFisher’ spyware can take over an iPhone or Android phones remotely

Spyware known as FinFisher is capable of taking control of a number of mobile devices including the iPhone, Bloomberg reports. According to researchers at the University of Toronto, the program can secretly record from a device’s microphone, track its location

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

‘FinFisher’ spyware can take over an iPhone or Android phones remotely

Spyware known as FinFisher is capable of taking control of a number of mobile devices including the iPhone, Bloomberg reports. According to researchers at the University of Toronto, the program can secretly record from a device’s microphone, track its location

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

BYOD mobile workers thumbing nose at IT security

Nearly 25% of mobile workers say they employ some sort of workaround on their smartphones to bypass IT controls and get at corporate data, while 12% of tablet users say they use similar tactics, according to the quarterly iPass Mobile

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,