Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Android Malware: Beware Counterclank | Google Fights Phishing

InformationWeek Daily
InformationWeek Daily  
  Monday, January 30, 2012
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines Columnist Google, Microsoft Say DMARC Spec Stops Phishing
By Thomas Claburn
New email authentication framework called DMARC, backed by major email and security tool providers, aims to make spoofed domains in messages a thing of the past.

RELATED
Aggressive Phishing Attack Targets Military Personnel
9 Ways To Minimize Data Breach Fallout

Android Counterclank: Malware, Or Smartphone Advertising?
Apperhand SDK drops a search icon onto the Android desktop and tracks your device's ID, but so does any adware. Here's what you need to know.

Kindle Fire Sales Hit 6 Million In Q4
Amazon’s Android-based tablet expected to boost year-end revenues, which the company is slated to report Tuesday.

Time To Scrap SSL?
Many security experts believe the Internet's trust model is broken. Figuring out how to fix it will take time and collaboration.

Commodity Hardware Meets Mission-Critical Apps: Success Story
Here's how First American Title Insurance saved $800,000 by exchanging its HP Superdome hardware for commodity x86 servers, and resisted pressure to move from SQL to Oracle database technology.

Google, Microsoft Say DMARC Spec Stops Phishing
New email authentication framework called DMARC, backed by major email and security tool providers, aims to make spoofed domains in messages a thing of the past.

Coke Super Bowl Campaign Blends TV, Tablets And Smart Phones
Coca-Cola's animated polar bears seen on TV will 'respond' to Facebook and Twitter comments and post fan photos and videos as part of a social-media-integrated campaign.

BroadSoft To Deliver UC Platform For Service Providers
Business Communicator brings voice, video, IM, text into one interface.

QUOTE OF THE DAY
Borrowing is not much better than begging; just as lending with interest is not much better than stealing. -- Doris Lessing

ALSO SEE

Google, Microsoft Say DMARC Spec Stops Phishing
Coke Super Bowl Campaign Blends TV, Tablets And Smart Phones
IT Pro Impact: NFC and Mobile Commerce
Malware War: How Malicious Code Authors Battle to Evade Detection
Smartphone, Tablet Races: 4 Telling Numbers
Big Data Management Best Practices That Boost Online Performance
Virtual Event: Clouds, Outsourcing, And Security Services

WE INVITE YOU TO...
"The Innovative CIO: Leadership, Innovation, and Global Change," an executive education program running in March at Stanford University. The three-day program includes keynote, classroom, and other hands-on sessions focused on the CIO's role in driving innovation.
Get More Details And Register To Attend

JOIN THE CONVERSATION
Posted By LifeGrapher:
"Microsoft is the company that built an OS where you had to hit a button labeled "Start" in order to shut your system down. Does anyone really want to buy a mobile phone with their software on it?"
In reply to: "Why RIM Should Cut BlackBerry Losses"
View Entire Response | Post Your Own Reply


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
IT Pro Impact: NFC and Mobile Commerce
Apple, RIM, Google and other smartphone makers are adding near field communication capabilities to their devices for release in 2012. Enterprise mobility teams should be ready to advise business leaders on how to incorporate mobile commerce into the organization's plans.
Download Now (Registration Required)

Featured Report
Fundamentals: Application Virtualization
The evolution of virtualization has exposed complexities in application distribution and management that we couldn't have imagined in the days of disposable disk images. Our report will help you get started.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Malware War: How Malicious Code Authors Battle to Evade Detection
The stakes have never been higher in the fight for control of corporate and consumer devices between malicious code and the antimalware software designed to detect and stop it. It's a war of one-upsmanship, as security labs work 'round the clock to analyze malicious code and the bad guys design new, ingenious ways to frustrate analysts and automated tools. This Tech Center report covers the key methods malware writers use to thwart analysis and evade detection.
Download Now (Registration Required)

The Business Case for Managed DDoS Protection
Discover how DDoS attacks are getting larger, more sophisticated and dangerous. Learn the risks to Internet infrastructure, revenues and brand equity. See how those risks multiply the more your business depends on the Web. This white paper also includes an ROI study which outlines the business case for using a cloud-based managed service. You'll be surprised to learn how quickly the right solution can pay itself, sparing your business substantial revenue losses and PR issues.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Smartphone, Tablet Races: 4 Telling Numbers
Hardware makers and network operators provided insight on adoption of the hottest mobile platforms--Android and iOS--via financial reports this week. Here are four things we learned.

Nokia Numbers Show Microsoft’s Mobile Madness
Every Windows Phone 7 device Nokia shipped in Q4 cost Microsoft $250, minus a royalty. But Microsoft is burning this cash with good reason.

6 Predictions For Business Intelligence In 2012
A look at in-memory analysis, visual discovery, big data, mobile BI, cloud and social BI achievements in 2011 and forecasts for the year ahead.

Apple iPad: Happy 2nd Birthday
Apple changed the way we think about computing and digital devices--again--when it introduced the iPad tablet in early 2010. Take a look back and a peek ahead.

Why Personal Health Records Have Flopped
It's not a security, privacy, or data-sharing problem. It's a patient problem.

 


SLIDESHOWS
Apple iPad: Happy 2nd Birthday
Apple changed the way we think about computing and digital devices--again--when it introduced the iPad tablet in early 2010. Take a look back and a peek ahead.   View Now

ALSO SEE
12 Hadoop Vendors To Watch In 2012
7 Tools To Tighten Healthcare Data Security

MORE SLIDESHOWS

spacer spacer spacer
spacer
 


WEBCASTS
Big Data Management Best Practices That Boost Online Performance
Join Gary Angel, president and CTO of Semphonic, as he details how you can identify the real factors driving online performance and determine the best way to improve results -- with robust, fast data analysis. It happens January 31, 2012. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Virtual Event: Clouds, Outsourcing, And Security Services
Join us on Feb. 15 for the our virtual event 'Clouds, Outsourcing, And Security Services': Making Providers Part of Your IT Security Strategy. When you attend, you will be able to access live and on-demand webcast presentations as well as virtual booths packed with free resources, and you can also be eligible to win great prizes!
Register Now

InformationWeek 500 2012: Call For Nominations!
We've started accepting nominations for this year's InformationWeek 500 -- our 24th annual ranking of the nation's very best business technology innovators. Orgs with $250 million or more in revenue may apply now!
Deadline is April 27 -- Don't Miss It!


This e-mail was sent to EmailAddress
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.