News

01:42 PM
Connect Directly
RSS
E-Mail
50%
50%

12 Least Secure Android Phones | DIY Stuxnet Attack Warning

InformationWeek Daily
InformationWeek Daily 
  Tuesday, November 22, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines Columnist Next DIY Stuxnet Attack Should Worry Utilities
By Mathew J. Schwartz
The recent water system hack in Illinois points to the dangers of insecure, Internet-connected industrial control systems. Environments like this can't ignore known security weaknesses anymore.

RELATED
Duqu Malware Detection Tool Released
Prisons May Be Vulnerable To Stuxnet-Style Attack

Android Buyer Beware: 12 Least Secure Phones
More than half of most popular Android smartphones run outdated--and insecure--versions of the OS. And update policies vary.

Federal IT Security Spending Called 'Light'
Federal agencies have budgeted $6.5 billion for security in 2012, much less on a percentage basis than other businesses and industries, an IDC report says.

APT Or Everyday Cybercrime? How To Tell
Of the many attacks corporate networks face daily, advanced persistent threats are the most serious. Consider these tips to tell which kind of attack you're facing and what to do about it.

5 Tips: Avoid Being A Social Media Turkey
Consider these lessons learned from companies and people who have gotten the social stuffing kicked out of them.

2011's Biggest Wireless Turkeys
As Thanksgiving approaches, who made the biggest wireless flops this past year?

HP Earnings Fall Short, Whitman Looks To Future
Meg Whitman's HP is focused more on the next decade than the next quarter, she says. And her HP has plenty of use for the personal systems business.

Social Standards: Web 2.0 Vs. Enterprise 2.0
The OpenSocial approach to defining social software standards has the backing of Jive, IBM, and others--and the scorn of upstarts like Yammer.

QUOTE OF THE DAY
"A thankful heart is not only the greatest virtue, but the parent of all the other virtues." -- Cicero

ALSO SEE
HP Earnings Fall Short, Whitman Looks To Future
Social Standards: Web 2.0 Vs. Enterprise 2.0
Strategy: Ensuring Secure Database Access
Google MapRequest: Successful Algorithm Implementation Techniques with Hadoop
10 Android App Flops
Recovery by Design: A Holistic Look At Data Recovery Planning And Methodology
It's Back: Our Annual U.S. IT Salary Survey

JOIN THE CONVERSATION
Posted By MosaicTechnology:
"...Everyone is guilty of glazing over the Terms and Conditions here and there. The best way to protect your devices is just to be smart about what apps you download and what permissions you grant."
In reply to: Kindle Fire: "Android Security Becomes FUD Fest"
View Entire Response | Post Your Own Reply

Posted By semi_adult:
"Yeah, I liked WP. Today, it's all gone, gutted to be basically an imitation MSWord, down to the point of implementing VBA."
In reply to: "Novell Puts Bill Gates On Witness Stand"
View Entire Response | Post Your Own Reply

 Digital Issue 
DOWNLOAD OUR NOVEMBER 21st DIGITAL ISSUE
THIS EDITION:
Follow The Data: Apply advanced analytics to the sales pipeline, Web traffic, and social buzz to anticipate what's coming, instead of just looking at the past.

ALSO: A Practical Guide To Biometrics, Hadoop Backing, and Much More!


DOWNLOAD NOW (Registration Required)

 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
Strategy: Ensuring Secure Database Access
Role-based access control based on least user privilege is one of the most effective ways to prevent the compromise of corporate data. But proper provisioning is a growing challenging, due to the proliferation of big data, NoSQL databases and cloud-based data storage.
Download Now (Registration Required)
Featured Report

Research: 2012 BI and Information Management Trends
Our 2012 Survey shows the old practice of following the money, using lagging financial indicators to guide a company's decisions, giving way to the forward-looking approach of following the data Our 542 respondents say mobile, cloud computing and, above all, analytics are making their mark within nearly every IT category.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacerspacerspacer
FEATURED WHITEPAPERS
Google MapRequest: Successful Algorithm Implementation Techniques with Hadoop
Hadoop is an ecosystem of components for implementing the Google MapReduce algorithms in a scalable fashion on commodity hardware. It enables organizations to store and process large volumes of data and analyze it in ways not previously possible with less scalable solutions or standard SQL-based approaches. This white paper highlights common Hadoop challenges and reveals a series of best practices to use when designing and implementing Hadoop solutions.
Download Now (Registration Required)


Long-term Data Retention Made Easy
Learn about how a single solution addresses many of the challenges organizations are struggling with as they balance requirements for disk based backup and sustainable long term archiving.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Android App Flops
Among Android apps, you'll find some jewels--and many stinkers. Here's our top 10 list of Android apps to skip, including a few names you might not expect.

10 Epic Android Apps
Among the hundreds of thousands of Android apps, we've rounded up 10 epic, must-have choices. These apps will save your bacon, day in and day out.

Android Security: Threat Level None?
Security firms are fanning the flames of fear about mobile malware and viruses, while others accuse such firms of being scammers. Who's right, and who's wrong.

Android Security Becomes FUD Fest
Big scary warnings about Android security just keep on coming. Are you focused on the right MDM questions?

Amazon Kindle Phone: Android Me-Too Could Flop
Amazon's cooking up a phone for 2012, analysts say. But will it be more than just a customer loyalty tool?

 

SLIDESHOWS

12 Top Big Data Analytics Players When data grows into the tens or even hundreds of terabytes, you need a special technology to quickly make sense of it all. From Hadoop to Teradata, check out the top platform options.   View Now


ALSO SEE
8 IT Hiring Strategies Of Top CIOs
10 Innovative iOS 5 Apps

MORE SLIDESHOWS
spacerspacerspacer
VIDEOS

Keynote: In Pursuit of Enterprise Nirvana: Genentech's Transcendent Journey
Adam Graff Senior Manager, Collaboration Services, Genentech Andy Wang Principal Systems Architect at Genentech   Watch

ALSO WATCH
Keynote: Rachel Happe, Co-Founder and Principal, The Community Roundtable
Keynote Panel: Social at the C-Level

MORE VIDEOS
spacer
 
WEBCASTS
Recovery by Design: A Holistic Look At Data Recovery Planning And Methodology
In this webcast, we'll explore a six step backup methodology that will make sure that when things do go south, you're ready with your sun hat on. It happens Wednesday, December 7, 2011 -- Time: 10:00 am PT/ 1:00 pm ET More Information & Registration

 
RESOURCES AND EVENTS
It's Back: Our Annual U.S. IT Salary Survey
For the 15th consecutive year, InformationWeek is conducting its U.S. IT Salary Survey. Upon completion of the survey, you will be eligible to enter a contest for prizes including a Bravia HDTV or iPad 2, and get a link to download our report once it is published.
Survey ends Jan. 20

Cloud Connect Is Coming!
Learn about the latest cloud technologies and platforms from industry leaders and thinkers at Cloud Connect. It takes place in Santa Clara, Calif., Feb. 13-16.
Get More Details And Register Today!


This e-mail was sent to %%email%%

INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Comment  | 
Print  | 
More Insights
Cartoon
Slideshows
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Twitter Feed