Most businesses have embraced mobile technologies, but many are still on the low end of the mobile maturity curve. Good Technology has published its second-quarter Mobility Index Report, and it reveals some interesting trends regarding the mobile platforms and apps businesses are deploying.
Good Technology aggregated data from customers around the world and monitored app and device activations to determine overall trends, as well as which platforms and apps are most popular among Good customers.
This is a preview of
Report: Android gaining on iOS in enterprise
.
Read the full post (141 words, estimated 34 secs reading time) Categories: General.
Tags: Android, Enterprise, Gaining, Report
By IPHere —
August 13, 2014 at 7:14 pm Data breach after data breach has illustrated just how weak and ineffective passwords can be for protecting accounts and sensitive information. Many sites and services have implemented secondary security protocols and two-factor authentication, but users frequently use information and email accounts that can be easily compromised—giving attackers a simple way to access your information.
This is a preview of
Attackers use domino effect to compromise your accounts
.
Read the full post (141 words, estimated 34 secs reading time) Categories: General.
Tags: Accounts, Attackers, Compromise, domino, Effect
By IPHere —
July 30, 2014 at 7:17 pm Don’t let the word “virtual” in virtual servers fool you. You’re the only one who knows it’s virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to it, or security threats trying to compromise it, the server is very, very real. A new survey from Kaspersky Labs found that many IT professionals understand that securing virtual environments is important, but don’t fully understand the threats or how to properly defend against them.
This is a preview of
Virtual servers still face real security threats
.
Read the full post (154 words, estimated 37 secs reading time) Categories: General.
Tags: 'Real, Face, Security, Servers, Still, Threats, Virtual
By IPHere —
July 29, 2014 at 1:14 am Congress has been pursuing an investigation into alleged misconduct at the IRS, and as a part of that investigation it requested emails from former IRS director Lois Lerner for the timeframe in question. The response Congress got was those emails—along with any archive or backups of those emails—have been erased and are no longer available. There are legal and compliance requirements organizations must abide by when it comes to retention of information, and the IRS apparently dropped the ball.
This is a preview of
Investigation of missing IRS email holds lessons for your business
.
Read the full post (169 words, estimated 41 secs reading time) Categories: General.
Tags: Business, Email, Holds, Investigation, Lessons, Missing
By IPHere —
July 22, 2014 at 7:15 pm I wrote yesterday about a report from Microsoft researchers, which goes against established password security best practices. The new guidance from the Microsoft researchers makes sense to me, because it fits how I handle password management already. However, at least one security expert feels that there is a fatal flaw that makes the new password advice impractical: You.
This is a preview of
Microsoft password research has fatal flaw
.
Read the full post (129 words, estimated 31 secs reading time) Categories: General.
Tags: fatal, Flaw, Microsoft, Password, Research
By IPHere —
July 18, 2014 at 1:13 pm Stop me if you’ve heard this one before: You should use unique, complex passwords for every login you have to manage, and you should employ a password management utility to keep track of it all. That is the prevailing advice, but a couple Microsoft researchers have come to the conclusion that it might be the wrong approach.
This is a preview of
Microsoft researchers: Use simple passwords for most of your accounts
.
Read the full post (146 words, estimated 35 secs reading time) Categories: General.
Tags: Accounts, Microsoft, Most, passwords, Researchers, Simple
By IPHere —
July 17, 2014 at 7:18 pm In early June the U.S. Department of Justice revealed that the Gameover Zeus (GOZ) botnet had been disabled thanks to the success of a joint effort dubbed “Operation Tovar.” The celebration appears to have been premature, though, as security researchers have already discovered a resurgence of Gameover malware infections.
While the Gameover botnet has lain dormant since the takedown, a new massive spam campaign has Sophos Labs researcher James Wyke concerned the threat has returned. A blog post reveals details of why it seems to be part of the same malware family.
This is a preview of
The game isn’t over yet for Gameover malware
.
Read the full post (111 words, estimated 27 secs reading time) Categories: General.
Tags: Game, Gameover, Isn't, Malware, Over
By IPHere —
July 14, 2014 at 1:14 pm It’s déjà vu all over again. After a mind-blowing 59 separate vulnerabilities were patched in Internet Explorer last month, the Microsoft Web browser is hogging the spotlight again in July.
This is a preview of
Internet Explorer is still the star of Patch Tuesday
.
Read the full post (150 words, estimated 36 secs reading time) Categories: General.
Tags: Explorer, Internet, Patch, star, Still, Tuesday
By IPHere —
July 8, 2014 at 1:19 pm As much of the workforce in the United States coasts through the rest of the day looking forward to an extended weekend to grill hot dogs and drink beer—I mean, celebrate the nation’s independence—Microsoft released its advance notification for next week’s Patch Tuesday. The six security bulletins include two ranked Critical, three Important, and one listed merely as Moderate.
This is a preview of
Microsoft plans six security bulletins for July Patch Tuesday
.
Read the full post (183 words, estimated 44 secs reading time) Categories: General.
Tags: bulletins, July, Microsoft, Patch, Plans, Security, Tuesday
By IPHere —
July 4, 2014 at 1:13 am All malware is bad, but some malware is more insidious than others. That seems to be the case with CosmicDuke. According to a new white paper from F-Secure, CosmicDuke meshes elements of two notorious malware threats—MiniDuke and Cosmu—to form a potent new attack.
MiniDuke is an APT (advanced persistent threat) Trojan that was uncovered in early 2013. It was used in targeted attacks against NATO and various European government agencies.
This is a preview of
CosmicDuke will steal your login data and own your network
.
Read the full post (150 words, estimated 36 secs reading time) Categories: General.
Tags: CosmicDuke, data, login, Network, Steal
By IPHere —
July 2, 2014 at 1:13 pm