background preloader

Mobility and Security

Facebook Twitter

Principes et lignes directrices.

Identity Management

Mobile Industry Facts. Les attaques contre les smartphones. 5 signs that you've lost control over your cloud apps. Smartphones and Tablets in the Company. The Surprising Truth About Smartphone App Security  I recently shared my thoughts on a troubling topic covered in InfoSecurity Magazine, and many other publications.

The Surprising Truth About Smartphone App Security 

As you’re probably aware, research from a US university undergraduate professor, Dan Wallach, shows that several Android apps, including an approved Facebook application, are sending out all data except for passwords “in the clear”. Anyone who follows this blog knows that I write extensively about the importance of managing the security of user credentials, particularly privileged account credentials. My response to Dan’s research, then, will come as no surprise.

This situation with Android is absolutely typical of open source software, since there is little incentive for the software developer to use secure protocols unless the destination system requires it. And this is the biggest issue with open source software. Android apps are an interesting case. 7 Steps to Stronger Enterprise iPhone Security CIO. CIO — Think iPhone security stinks?

7 Steps to Stronger Enterprise iPhone Security CIO

A new Forrester Research report finds that the iPhone and iPad are secure enough for most enterprises, including highly regulated ones. IPhone Attack Reveals Passwords in Six Minutes. Researchers in Germany say they've been able to reveal passwords stored in a locked iPhone in just six minutes and they did it without cracking the phone's passcode.

IPhone Attack Reveals Passwords in Six Minutes

The attack, which requires possession of the phone, targets keychain, Apple's password management system. Passwords for networks and corporate information systems can be revealed if an iPhone or iPad is lost or stolen, said the researchers at the state-sponsored Fraunhofer Institute Secure Information Technology (Fraunhofer SIT). It is based on existing exploits that provide access to large parts of the iOS file system even if a device is locked.

Franhofer SIT Tech solutions

Mobility and Security by McAfee. Avast Mobile Security débarque sur le Market, mais un antivirus sur Android, est-ce vraiment utile ? Les problèmes de sécurité d'Android et son Android Market s'invitent régulièrement dans l'actualité.

Avast Mobile Security débarque sur le Market, mais un antivirus sur Android, est-ce vraiment utile ?

Il y a à peine deux semaines, nous vous rapportions que Google avait retiré 22 malwares déguisés en applications classiques sur sa boutique en ligne. À la mi-novembre, nous nous faisions également écho d'une hausse vertigineuse de 427% en l'espace de trois mois du nombre de virus, trojans et autres malwares sur l'OS mobile de Google. Et ce n'est pas près de s'arranger. D'une part du fait de la nature ouverte de cet OS. D'autre part en raison des ventes exponentielles de smartphones Android. Mêmes causes, mêmes conséquences... même solution ? C'est dans ce contexte qu'Avast Software sort sa solution avast! • Une fonction Antivirus L'utilisateur peut lancer ou planifier un scan de son smartphone et de la carte mémoire afin de détecter et éradiquer les virus, trojans et autres malwares. . • Filtrage des appels et SMS avast!

Kaspersky Endpoint Security for Smartphone. How To Encrypt Your Smartphone. Your smartphone is going to get stolen, and whether the culprits are a pack of well-meaning pranksters or police officers breaking up a peaceful protest, you'll want to ensure that your private data is safe.

How To Encrypt Your Smartphone

No kind of encryption is foolproof, but taking a few moments to implement these simple tips will go a long way towards making sure your personal data remains secure when the trouble starts. Encrypt Your Android Phone. Why Secure Your Mobile Devices? Smartphone Security Best Practices. 10 Best IT Practises for Smartphone. Treat all smartphones as uncontrolled endpoints.

10 Best IT Practises for Smartphone

Humans, Not Systems, New Targets of Hack Attacks Requiring New Security Methods. Regulators are more vigilant than ever before, and firms are struggling to keep up with new, sophisticated attacks.

Humans, Not Systems, New Targets of Hack Attacks Requiring New Security Methods

Firms are struggling and failing to stay ahead of rapidly increasing cyber attacks, different types of attacks and new technologies to prevent them. A new report by Ernst & Young found that new Advanced Persistent Threats (APTs) are particularly resistant to firms' traditional security methods. Protecting against these attacks requires several layers of defense, knowledge of the threat and specific skills to detect and react to ongoing attacks. iPhone - iPhone en entreprise. Understanding passcodes. Languages Learn about using passcodes and fingerprints with iOS devices.

Understanding passcodes

You can use a passcode on your iPhone, iPad, or iPod touch to protect your data. EyeD® Biometric Password Manager for iPhone 4 and iPhone 4S on the iTunes App Store. Génération Y et sécurité: quels risques, quelles opportunités? IDC: Mobile Workers Will Pass 1 Billion in 2010. By Rob Garretson The number of mobile workers accessing enterprise systems worldwide will top the 1 billion mark this year on the way to 1.2 billion by 2013, or more than a third of the world’s workforce, according to a new forecast from research firm IDC.

IDC: Mobile Workers Will Pass 1 Billion in 2010

Although the most significant gains will be in the emerging economies of Asia-Pacific, and growth in the U.S. and Japan has nearly peaked, the U.S. will remain the most highly mobile workforce in the world, IDC says, with the proportion of mobile workers in its workforce predicted to surpass 75 percent, or 119.7 million people, in 2013. The ongoing economic recovery and new interest in unified communications will drive growth in mobility spending overseas, where mobile workforce penetration is not as saturated. The new IDC study provides analysis across three core worker categories: office-based mobile workers, non-office-based mobile workers, and home-based mobile workers.

Among the key findings of the IDC report: Debate - Should Enterprises Get Tablet-Ready? Enterprises need to realize that tablets have a cool-factor attached to them.

Debate - Should Enterprises Get Tablet-Ready?

They are slim, easy to carry, and also make it easy for employees to work while on the move. It’s true that it is difficult to measure the improvement in productivity that it brings, but it definitely makes organizations customer-ready by providing their staff with better accessibility to information. Sure, technology is constantly evolving and it doesn’t make sense to provide every end user with a tablet. Docs.blackberry.com/en/admin/deliverables/40468/BlackBerry_Bridge_App_2.0_and_BlackBerry_Playbook_Tablet_2.0.1-Security_Technical_Overview-1329934937453-2.0.1-en.pdf. Information Security in the Age of BYOD.

By Brian Contos, CISSP, Customer Security Strategist and Senior Director, Vertical & Emerging Market Solutions, McAfee Bring your own device or BYOD is becoming the global norm. Prices for consumer electronics decrease while capabilities increase.

BYOD Trend