Loading

Monday, December 21, 2009

Protect Mobile Devices from Malicious Attacks

What you have a mobile device? and use it to access the network at your office? If so, be careful. Did you know if the mobile device can become the entrance malware, spyware and so forth? This does not just harm the user, but also can steal important company data. This occurs when the tool you use to access corporate networks, which may not be protected.

"The device moves and the number of users who continue to grow creating a larger target for the software and may be dangerous, including worms, viruses, and spyware," said Sean Ryan, Research Analyst of Mobile Enterprise Software, IDC. "Along with the continued rise in the number of mobile devices and the increasing need for information technology, the company needs to secure and manage these devices and the information in it increased significantly."

According to IDC research institutions, the number of convergent mobile devices, including notebooks, the world continues to grow. This year, the number predicted exceeded 167 million units. This number will continue to increase, with estimates of more than 291 million units in 2013, and grew 14 percent per year in combined (CAGR).

The amount of potential damage has triggered Symantec announces security strategy and management of mobile services. The focus is the integration of security and management solutions to reduce downtime, increase user productivity, improve response time and provide protection and management throughout the life cycle of mobile devices, including while on standby.

"Organizations need the control and management of larger companies to protect information and ensure user productivity - with less cost," said Art Gilliland, Vice President of Enterprise Security Group, Symantec. "Our mobile service strategy designed to protect and manage data wherever and automate procurement and supply, providing care and protection continuously, and non-activate mobile device immediately when the device is lost, damaged, stolen, or replaced."

What kind of management and security strategy to move Symantec services? There are three products, namely:
• Symantec Endpoint Protection Mobile Edition 6.0. Provide protection through advanced antivirus, firewall, and SMS anti-spam protection.
• Network Access Control Symantec Mobile Edition 6.0. Keeping the network access policy enforcement and e-mail in MS Exchange with Symantec Endpoint Protection Mobile Edition. Equipped logging, reporting, and centralized alert.
• Symantec Mobile Management 7.0. Improve efficiency with the implementation of IT applications and updates wirelessly.

Security solutions and mobile device management are made based Symantec Symantec Management Platform, and provides integrated management capabilities for enterprise-class desktops, laptops, servers, and mobile devices. This allows administrators to set and distribute the centralized security policies to mobile devices wirelessly. Timely content updates can be done through integration with Symantec LiveUpdate.

Predicted Malware Attacks Increased in 2010

Security solutions developer Kaspersky Lab has warned the risk of malware attacks increasingly nasty next year. Several types of attacks is expected to rise to attack the middle platorm popular today such as Google Wave, iPhone, Android, and Windows 7.  "Malware is much more sophisticated in 2010 and many antivirus programs will slow in the treatment of the infected computer because the file infection method and rootkit technology is increasingly sophisticated," said Alex Gostev, Director of Kaspersky Lab's Global Research and Analysis Team in the press release. He said the IT security firm will respond by developing tools to more complex protection. But a malicious program is able to pass these measures may be more or less immune to antivirus programs for some time.

According to the company's experts, in the coming years we will see a shift in the kinds of attacks against users from attacks through web sites and applications to attacks originating from file sharing networks. Since 2009 a series of mass epidemic of malware has been supported by the spread malicious files via torrent portals. This method has been used to spread threats such as the famous and TDSS and Virut first backdoor for Mac OS X. In the year 2010, predicted a significant increase in the incidence of this type of P2P networks (peer to peer).  Cyberspace criminals will continue to compete in the Internet traffic. Modern cyberspace crimes generate more and more efforts to legalize themselves, and there are many ways to earn money online with traffic in larger amounts that can be generated by a botnet that disusupkan applications to multiple computers and is ready commanded from a distance. Currently, most of the black-market services to take advantage of competing botnet traffic.

In the future, Kaspersky predicts the emergence of more transactions botnet scheme, called "partners program" where possible botnet owners to generate profits from such activities, send spam, DoS attacks or spreading malware without an explicit crime. Parties who want to stay memanaatkan pay the amount equivalent conducted infiltration.  However, predict a decline Kaspersky Trojan variants that occurred in the year 2009 through fake antivirus programs. The latter appears first in 2007 and in 2009 and seen increased activity of their involvement in a number of major epidemics. For example, worms Kido, install rogue antivirus program in the infected computer. The reason, fake antivirus market is now saturated and profits for cyber crimes decreased. In addition, these activities are monitored by the IT security companies and agencies of law enforcement. It is difficult to manufacture and distribution of fake antivirus programs.

In addition, attacks on Web services happen, Google would seem Wave headlines in 2010. The attack on Google's new service is no doubt going to use the usual pattern: first, followed by spamming phishing attacks, and then mengeskploitasi vulnerability and spread of malware. Planned launch of Chrome OS-based network is a noteworthy event, but the experts at Kaspersky Lab does not anticipate the emergence of interest in excess of the platform of this virtual world of evil.  Year 2010 will also certainly more difficult for the iPhone and Android. The first malicious programs for mobile platforms emerged in the year 2009, which is a sure sign that they have aroused interest cyberspace criminals. The only iPhone users at risk are those who have compromised devices, but the same can not apply for Android users are all vulnerable to attacks. Increasing popularity of mobile Android OS in China combined with the absence of effective checks to ensure the security application software will cause a third party a number of malware outbreaks with a high profile.

Detection of new vulnerabilities will remain a major cause of the epidemic. This vulnerability will be detected in the software developed by third parties (such as Adobe, Apple, etc..) And on Windows 7, the new operating system just memasukki market. If no serious vulnerability is detected, the year 2010 may prove to be one of the quietest year for some time.  In the year 2008, analysts estimate the company's increase in the global epidemic. Prediction was proven true since the year 2009 appears malicious programs by function sophisticated rootkits, worms Kido also known as Conficker, web attacks, botnet, SMS fraud and attacks on social networks.

Wednesday, December 9, 2009

Business Cooperation Microsoft and Yahoo Finally Signed

Yahoo-Bing

The business search engine and online advertising between Microsoft and Yahoo finally signed. Both sides claimed to have completed all parts of the cooperation agreement and hope to implement it starting next year.

"Microsoft and Yahoo believe this agreement will create an alternative search engine services more sustainable and more attractive, providing real choices, better benefits, and innovation for consumers, advertisers, and publishers," the joint statement released last Friday.

Memorandum of understanding between the two sides earlier agreed in July between CEO Steve Microsot Yahoo Ballamer and CEO Carol Bartz. In cooperation, they agreed to work together for ten years to compete with Google which currently dominate the market search engine and online advertising.

One of the main agreement is the Yahoo search engines will use artificial Bing Microsoft on their site. Yahoo also will get a share of advertising revenue earned from the Microsoft business search engine and ad network. The agreement is a form of compromise from Yahoo acquisition bid by Microsoft, but it was rejected several times.

Apple is Exploring the Acquisition Lala

Music Online

Currently Apple is exploring the acquisition Lala.com, an online service provider of streaming and downloading music. The presence of Lala is believed would end the era of MP3 because to enjoy music through the Lala can be done without the need to download it via high-speed streaming service.

In October, Lala.com cofounder Bill Nguyen demonstrates that the application can work on the iPhone. These applications provide 8 million song titles that can be heard live via the Internet. To be able to listen to a song, the user must pay a license at a price of 10 cents, but as soon as it entered the playlist of the song can be heard at any time.

Own voice quality is lower than the songs sold on iTunes. However, Lala developed technology enabling quick searches and direct songs can be heard in a short time. Laura cloud services apply technology in this service with a powerful streaming server.

Nguyen calls this concept as the beginning of the demise of MP3. However, Lala also provides download songs in MP3 format at a cost of 89 cents per song. By comparison, downloads on iTunes cost 69 cents per song. Lala also offers a streaming link to a profile posted on Facebook at the cost of 10 cents per song.

Lala is a new company that stood in Palo Alto, Caliornia. Launched in 2006 with an investment of U.S. $ 35 million from Bain Capital LLC, Ignition Partners and Warner Music Group Corp. The company debuted as a seller of online music CD sales but switch songs began in October 2008. For now, the new Lala services available in the U.S..

Speed SDXC achieve 300 MB/s

SDXC-memory

What you still remember the SDXC? This is a memory card format announced about a year ago. Unfortunately this card is less popular because of the standards / compatibility. However, recently reported, the standard SD memory card (Secure Digital) next generation, SD Specification Version 4.00, will be completed in the spring of 2010. This could mean that the cards will start SDXC can be bought in the early-or mid-2010. What is interesting?


Well, this card is suitable to answer the needs of high-definition video. For the promised transfer rate is 300MB/s, far above the rate of transfer of 104 MB/s which is currently offered by the SD Specification Version 3.00. To boost the speed, this card will use a new transfer scheme and also a new pin. Current parallel technology used will be replaced by serial transfer of technology, which will also be available for use in SD Input / Output (SDIO).

The goal is to make the bus SD can also be used as an internal bus in embedded systems, such as mobile phones. It is fun - but the leap is almost 3x the speed of folding - is the size and form factor of the ultra-fast SD card will remain the same as before. Parallel pins also remain there. This means that (theoretically) SDXC cards will be used, writeable and readable by the old SD card reader, of course at a slower pace.

Wednesday, December 2, 2009

His Girlfriend was Killed by Barbaric

Stewart Blackburn-KillerA British boy, Stewart Blackburn (18 years) charged with murdering his girlfriend, Jessica McCagh by burning. Jessica allegedly kicked, hit his head, then doused with gasoline and burned barbaric way. According to prosecutors at Superior Court Livingstone, Jessica lost their lives in the most horrible circumstances on April 25, ago. In the ninth session in court yesterday, the attorney general Frank Mulholland QC said Jessica died at the age of 17 years. Blackburn defendant admitted that his girlfriend died at the age of 17 years, but he denied murder. She was the girl who loved her family, but she died in a terrible state, and she burned to death."

"The core of this case, he burned to death at the hands of Blackburn Stewart, who poured gasoline and set fire to her body. This extraordinary crime. It's hard to imagine a cruel or sadistic treatment of other human beings like this." Therefore, the prosecutor urged the jury to convict the defendant guilty of murder. "You have to punish people guilty of murder, guilty of acts of barbarism and crimes against a defenseless young man."

The trial had previously been listening to confessions Blackburn as contained in the docket are made the police. Blackburn denied he had killed his girlfriend. He argued, the fire that appeared at that time, he turned on with the victim after they engaged conversation. But prosecutors insisted that Blackburn was the one who had killed Jessica. Mulholland said that Blackburn on the night in the drunk and angry. He deliberately pushed Jessica to a fence and hit his head.

"Violence like this is action thugs," said Mulholland. He also showed evidence that the previous Blackburn threatened to burn her boyfriend's family house with gasoline. Victim's parents, Garry and Marian McCagh, yesterday appeared in the High Court in Livingstone.
Why does the faith provision the advisory contempt?

podcast directoryTopOfBlogsblog search directory Bloggers & Blogging Blogs - BlogCatalog Blog Directory

Strength of The Heroes of The City © 2008-2011, Template Source by template1st

TOP