Siri open to anyone even when iPhone 4S locked
The default settings for Apple’s new iPhone 4S personal assistant Siri allows anyone to give it commands when it’s password-locked.
The default settings for Apple’s new iPhone 4S personal assistant Siri allows anyone to give it commands when it’s password-locked.
On one wall of McAfee's expensive-looking executive briefing centre in Santa Clara, California, a live feed from the company's Global Threat Intelligence system displays the names of malware variants as they're detected in real time -- red LEDs on shiny black acrylic.
Stilgherrian | 19 Oct | Read more
Lookout, the company behind the most popular Android antivirus software, has released its first product for iOS iPhone and iPad devices.
Security managers must break down their walled-garden mentalities and integrate security deep into the heart of increasingly flexible, BYO computing-driven IT service management (ITSM) environments or risk data death by a thousand cuts, a systems and security consultant has warned.
David Braue | 18 Oct | Read more
A 26 year-old German man has been sentenced to three years imprisonment for rigging retail card payment consoles to transmit captured card details and PINs over Bluetooth.
Confidentiality, integrity and availability are oft-mentioned goals of <a href="http://www.networkworld.com/topics/security.html">security</a>, and that being the case, this week's <a href="http://www.networkworld.com/news/2011/101311-blackberry-restored-251941.html">lack of service globally for the BlackBerry</a> constitutes a profound security collapse.
Ellen Messmer | 15 Oct | Read more
Even apart from the serious security flaw in HTC Sense and malware that talks to an encrypted blog, to name just two recent issues, a consensus seems to be emerging. Android has serious security problems.
Stilgherrian | 14 Oct | Read more
The SSL certificate authorities like <a href="http://www.networkworld.com/news/2011/090611-comodo-hacker-claims-credit-for-250454.html">Comodo</a> that have had their security undermined by hackers shouldn't be trusted, and in fact, the way the entire <a href="http://www.networkworld.com/news/2011/091911-clarke-cybersecurity-251014.htm">SSL certificate industry of today</a> works can and should be replaced with something better, says <a href="http://en.wikipedia.org/wiki/Moxie_Marlinspike">Moxie Marlinspike</a>, a security expert who's come up with a plan he says will do that.
Ellen Messmer | 13 Oct | Read more
If you use your Android smartphone for both business and pleasure, a product introduced today at a trade show in Germany appears to be worth following. A version of Android called BizzTrust creates two partitions in Android--one for personal use and another super-secure one for business.
John P. Mello Jr. | 12 Oct | Read more
3LM, the company founded by former Android developers and since acquired by Motorola, is making its enterprise security platform for Android phones available this week.
Nancy Gohring | 10 Oct | Read more
This week the respectful thoughts of many turned to <a href="http://www.networkworld.com/news/2011/100711-apple-251711.html">Steve Jobs</a>, the legendary co-founder of <a href="http://www.networkworld.com/slideshows/2009/060309-apple-quiz.html">Apple</a>, who passed away at the age of 56. When it comes to <a href="http://www.networkworld.com/topics/security.html">security</a>, Apple computers were remarkable for the kinds of troubles they largely didn't have in comparison to <a href="http://www.networkworld.com/subnets/microsoft/">Microsoft</a>-based computers with their high rate of enterprise adoption that the Apple Macintosh never achieved. Microsoft operating systems and <a href="http://www.networkworld.com/topics/applications.html">applications</a> over time have been relentlessly targeted by attackers if only because Microsoft products constituted a large field of malware opportunity due to their huge market acceptance, plus the number of <a href="http://www.networkworld.com/community/blog/microsoft-fix-23-security-holes-8-patches-tue?source=NWWNLE_nlt_security_2011-10-07">vulnerabilities discovered in them</a> month after month.
Ellen Messmer | 08 Oct | Read more
It's hardly the kind of thing any company wants attached to its name, but HTC's rapid acknowledgment of confessed "serious" security exploit, discovered and published this week by security researchers, may ultimately help deflect criticisms and will, regardless, serve as a valuable reminder to CSOs that mobile devices represent a new and still-evolving security threat within the enterprise.
David Braue | 07 Oct | Read more
These days, it is almost impossible to meet someone who doesn't own a cell phone. More specifically, smart phones, whether it be the trendy iPhone, corporate favored Blackberry or modern Windows Mobile, almost everyone has joined the smart phone frenzy -- and with good reason. A smart phone offers more advanced computing ability and connectivity than a contemporary phone.
Spencer McIntyre | 07 Oct | Read more
In August 2010, hackers bent on jailbreaking Android smartphones found a vulnerability in the way the Android debugger handled an overwhelming number of processes. The code designed to exploit the flaw, dubbed RageAgainstTheCage, allowed users to reflash their smartphone and install custom firmware.
Robert Lemos | 06 Oct | Read more
Concerned that your employees are being a bit lax when it comes to looking after their laptops? Steal them yourself, one vendor has advised in the wake of yet another damning security report that suggests laptops and other equipment are literally walking out of Australian companies that are still operating at far below world's best practice when it comes to device security.
David Braue | 06 Oct | Read more
When something as seemingly esoteric as USB security can hit a mainstream cartoon like Dilbert, you know it’s a real issue. But it’s also one that has been poorly addressed by many companies, whose employees seem to be losing data through this largely unpoliced security hole faster than your Uncle Barry going through $2 coins at the local TAB.
David Braue | 05 Oct | Read more
According to industry analysts, mobile device shipments will exceed a billion devices in 2015 and will rapidly outrun PC shipments. That's great news for end user convenience, mobility, and work-anywhere productivity. But it also means that enterprises must brace for the fact that the <a href="http://www.csoonline.com/article/690905/iphone-and-ipad-security-the-human-element">bad guys will target these devices</a> with attack exploits, spyware, and rogue applications.
George V. Hulme | 06 Oct | Read more
New research conducted on behalf of the Wi-Fi Alliance shows that while wireless users are making strides on the security front, they’re still leaving their Wi-Fi networks too open to intruders.
It's a late night, and you've fired up Facebook on your ACME.com company-owned iPad to post some bad news. "A reduction in workforce is going to happen this week," you type into your update status field and tap the post button.
Tom Kaneshige | 05 Oct | Read more
Websites that accidentally distribute rogue code could find it harder to undo the damage if attackers exploit widespread browser support for HTML5 local storage and an increasing tendency for heavy users of Web apps never to close their browser.
Lucian Constantin | 05 Oct | Read more