And on that point it is still far easier to target workstations (client-side
attacks) and servers (sql injection) for data theft then mobile phones. This
will change as either desktops/servers become harder, mobile devices become
easier or have more data that people want, or as I have said for
Agree lots with the last two comments. Mobile malware right now to me
is more about what the (gross generalisation coming!) younger generation
are likely to download 20 times a day. In fact, privacy bending EULAs
are more of a worry than *real* malware. Such a goldmine of data and so
easy to
A lot of what was discussed at RSA Security conference this year was
surrounding the rise of mobile computing, and if your mobile phone has
information on it which an adversary would like to obtain they are going
to get it. Again two of the biggest pain points I see right now, is
Tablets ( and
Definitely.
Presently, mobile malware is all about what you download. When we start to
see web-based attacks against smartphones, then the stakes will begin to
increase.
* *
*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…
*
On Sat, Mar 3,
There was the PDF exploit in iPhone IOS3 (?) that allowed jail breaking. But
from a corporate espionage PoV, I'm more worried about an enemy stealing a
senior executive's phone in a bar, than getting some mobile malware onto their
phone.
You can mitigate attacks against the phone by having
On Sat, Mar 3, 2012 at 12:04 AM, Ken Schaefer k...@adopenstatic.com wrote:
On the other hand, mobile malware is almost non-existent.
So far. It's only a matter of time.
On the phone: contacts, email, documents, one factor of many
2FA systems, a way to social engineer into an environment
-Original Message-
From: Ben Scott [mailto:mailvor...@gmail.com]
Sent: Sunday, 4 March 2012 3:06 AM
To: NT System Admin Issues
Subject: Re: Do you think the security industry exaggerates the threat of
mobile malware?
On Sat, Mar 3, 2012 at 12:04 AM, Ken Schaefer k...@adopenstatic.com
Would like to see your guys' opinion on this. I have an enterprise architect
here that says so what if a C-level loses his smartphone, it's only contacts
in there...
Agree? Disagree? Take the poll :-)
Dave
-Original Message-
From: Virus Bulletin enews
Well you weren't specific about what type of smartphone. We use Blackberries
and initiate a complete wipe, we have policies in place that require the user
to send a support request in immediately and /or call our director. We give
them the rundown every time a new user gets a device about who
On the subject of mobile malware, it maybe over exaggerated at the moment,
but it only takes 1 instance for a mobile device to be infected. Depending
on the type of malware it could be more than the users contacts that get
sent back to the malware authors. Then it becomes an issue of why
If anything it isn't taken seriously enough. Smartphones are a gold mine of
information and an ever increasing access mechanism into company networks.
-Original Message-
From: David Lum [mailto:david@nwea.org]
Sent: Saturday, 3 March 2012 4:00 AM
To: NT System Admin Issues
Subject:
Does generic marketing exaggerate reasons for buying generic product?
But, to your question: A smart phone usually contains a lot more than just
contacts - but that would depend on your organization.
--
Espi
On Fri, Mar 2, 2012 at 9:59 AM, David Lum david@nwea.org wrote:
Would like to
On Fri, Mar 2, 2012 at 09:59, David Lum david@nwea.org wrote:
Would like to see your guys' opinion on this. I have an enterprise architect
here that says so what if a C-level loses his smartphone, it's only contacts
in there...
Agree? Disagree? Take the poll :-)
Dave
Well, that
On the other hand, mobile malware is almost non-existent.
Losing a smartphone (or having it stolen), on the other hand, is an
all-to-regular occurrence...
On the phone: contacts, email, documents, one factor of many 2FA systems, a way
to social engineer into an environment
-Original
14 matches
Mail list logo