Wednesday, 3 July 2013

Android vulnerability allows attackers to turn apps into Trojans without breaking their signatures

Spam blizzards used to hide malicious activities | IE10 pushes past predecessor to take second place among Microsoft's browsers

Today's InfoWorld Headlines: Wrap Up

Forward this to a Friend >>>


Android vulnerability allows attackers to turn apps into Trojans without breaking their signatures
A vulnerability that has existed in Android for the past four years can allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the OS. Researchers from San Francisco mobile security startup firm Bluebox Security found the flaw and plan to present it in greater detail at the Black Hat USA security conference in Las Vegas later this month. Read More


WHITE PAPER: Dell Inc.

CIO Strategies: Modernize Data Protection Practices
Traditional approaches to data protection are no longer enough. A strategy that thoughtfully augments your legacy infrastructure with modern data protection approaches can help reduce complexity, slash costs, and minimize risk of loss Read Now!

WHITE PAPER: ServiceNow

Drive More Value from Your IT Assets
You can make your life simpler when you automate your entire IT Asset Management (ITAM) lifecycle and Software Asset Management (SAM) in one system of record. You'll also reduce costs, eliminate wasted resources, improve compliance, mitigate security risks, and drive standardization. Read Now!

Spam blizzards used to hide malicious activities
Digital desperadoes have begun hiding their larcenous activities behind blizzards of spam aimed at their victims' inboxes, a report released Tuesday by a cloud security provider notes. The technique, called Distributed Spam Distraction, began appearing early this year, AppRiver revealed in its Global Threat & Spamscape Report for the first half of 2013. Read More


WHITE PAPER: SkillSoft

Actionable Leadership in the Creative Age
The world is changing. Competition is emerging more rapidly. To stay ahead, you need to leverage the power of every individual. Learn key leadership strategies to make an impact at your organization. Learn More

IE10 pushes past predecessor to take second place among Microsoft's browsers
IE10 (Internet Explorer 10) jumped into second place among Microsoft's browsers last month, pushing past IE9 through an enforced upgrade. IE10's user share climbed from 16.5 percent to a record 24 percent of all copies of Internet Explorer in June, according to Web measurement firm Net Applications. Read More

Android lock-screen bypass highlights mobile risk
A Skype bug that enables an attacker to bypass the lock screen on several Android mobile devices demonstrates once again the need for additional security to protect corporate data against such flaws, experts say. "Pulser," the developer administrator for XDA-Developers Forum, reported the bug in Skype version 3.2.0.6673, which was released on Monday. Skype is installed on more than 100 million Android devices worldwide, says Microsoft, which acquired the messaging platform in 2011. Read More



Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_wrap_up as oraclepedia@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2013 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **