Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

12 Least Secure Android Phones | DIY Stuxnet Attack Warning

InformationWeek Daily
InformationWeek Daily  
  Tuesday, November 22, 2011
Between The Lines ColumnistNext DIY Stuxnet Attack Should Worry Utilities
By Mathew J. Schwartz
The recent water system hack in Illinois points to the dangers of insecure, Internet-connected industrial control systems. Environments like this can't ignore known security weaknesses anymore.

Duqu Malware Detection Tool Released
Prisons May Be Vulnerable To Stuxnet-Style Attack

Android Buyer Beware: 12 Least Secure Phones
More than half of most popular Android smartphones run outdated--and insecure--versions of the OS. And update policies vary.

Federal IT Security Spending Called 'Light'
Federal agencies have budgeted $6.5 billion for security in 2012, much less on a percentage basis than other businesses and industries, an IDC report says.

APT Or Everyday Cybercrime? How To Tell
Of the many attacks corporate networks face daily, advanced persistent threats are the most serious. Consider these tips to tell which kind of attack you're facing and what to do about it.

5 Tips: Avoid Being A Social Media Turkey
Consider these lessons learned from companies and people who have gotten the social stuffing kicked out of them.

2011's Biggest Wireless Turkeys
As Thanksgiving approaches, who made the biggest wireless flops this past year?

HP Earnings Fall Short, Whitman Looks To Future
Meg Whitman's HP is focused more on the next decade than the next quarter, she says. And her HP has plenty of use for the personal systems business.

Social Standards: Web 2.0 Vs. Enterprise 2.0
The OpenSocial approach to defining social software standards has the backing of Jive, IBM, and others--and the scorn of upstarts like Yammer.

"A thankful heart is not only the greatest virtue, but the parent of all the other virtues." -- Cicero


HP Earnings Fall Short, Whitman Looks To Future
Social Standards: Web 2.0 Vs. Enterprise 2.0
Strategy: Ensuring Secure Database Access
Google MapRequest: Successful Algorithm Implementation Techniques with Hadoop
10 Android App Flops
Recovery by Design: A Holistic Look At Data Recovery Planning And Methodology
It's Back: Our Annual U.S. IT Salary Survey

Posted By MosaicTechnology:
"...Everyone is guilty of glazing over the Terms and Conditions here and there. The best way to protect your devices is just to be smart about what apps you download and what permissions you grant."
In reply to: Kindle Fire: "Android Security Becomes FUD Fest"
View Entire Response | Post Your Own Reply

Posted By semi_adult:
"Yeah, I liked WP. Today, it's all gone, gutted to be basically an imitation MSWord, down to the point of implementing VBA."
In reply to: "Novell Puts Bill Gates On Witness Stand"
View Entire Response | Post Your Own Reply

  Digital Issue  
Follow The Data: Apply advanced analytics to the sales pipeline, Web traffic, and social buzz to anticipate what's coming, instead of just looking at the past.

ALSO: A Practical Guide To Biometrics, Hadoop Backing, and Much More!

DOWNLOAD NOW (Registration Required)


Strategy: Ensuring Secure Database Access
Role-based access control based on least user privilege is one of the most effective ways to prevent the compromise of corporate data. But proper provisioning is a growing challenging, due to the proliferation of big data, NoSQL databases and cloud-based data storage.
Download Now (Registration Required)
Featured Report

Research: 2012 BI and Information Management Trends
Our 2012 Survey shows the old practice of following the money, using lagging financial indicators to guide a company's decisions, giving way to the forward-looking approach of following the data Our 542 respondents say mobile, cloud computing and, above all, analytics are making their mark within nearly every IT category.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Google MapRequest: Successful Algorithm Implementation Techniques with Hadoop
Hadoop is an ecosystem of components for implementing the Google MapReduce algorithms in a scalable fashion on commodity hardware. It enables organizations to store and process large volumes of data and analyze it in ways not previously possible with less scalable solutions or standard SQL-based approaches. This white paper highlights common Hadoop challenges and reveals a series of best practices to use when designing and implementing Hadoop solutions.
Download Now (Registration Required)

Long-term Data Retention Made Easy
Learn about how a single solution addresses many of the challenges organizations are struggling with as they balance requirements for disk based backup and sustainable long term archiving.
Download Now (Registration Required)


10 Android App Flops
Among Android apps, you'll find some jewels--and many stinkers. Here's our top 10 list of Android apps to skip, including a few names you might not expect.

10 Epic Android Apps
Among the hundreds of thousands of Android apps, we've rounded up 10 epic, must-have choices. These apps will save your bacon, day in and day out.

Android Security: Threat Level None?
Security firms are fanning the flames of fear about mobile malware and viruses, while others accuse such firms of being scammers. Who's right, and who's wrong.

Android Security Becomes FUD Fest
Big scary warnings about Android security just keep on coming. Are you focused on the right MDM questions?

Amazon Kindle Phone: Android Me-Too Could Flop
Amazon's cooking up a phone for 2012, analysts say. But will it be more than just a customer loyalty tool?



12 Top Big Data Analytics Players When data grows into the tens or even hundreds of terabytes, you need a special technology to quickly make sense of it all. From Hadoop to Teradata, check out the top platform options.   View Now

8 IT Hiring Strategies Of Top CIOs
10 Innovative iOS 5 Apps


spacer spacer spacer
Keynote: In Pursuit of Enterprise Nirvana: Genentech's Transcendent Journey
Adam Graff Senior Manager, Collaboration Services, Genentech Andy Wang Principal Systems Architect at Genentech   Watch

Keynote: Rachel Happe, Co-Founder and Principal, The Community Roundtable
Keynote Panel: Social at the C-Level



Recovery by Design: A Holistic Look At Data Recovery Planning And Methodology
In this webcast, we'll explore a six step backup methodology that will make sure that when things do go south, you're ready with your sun hat on. It happens Wednesday, December 7, 2011 -- Time: 10:00 am PT/ 1:00 pm ET More Information & Registration


It's Back: Our Annual U.S. IT Salary Survey
For the 15th consecutive year, InformationWeek is conducting its U.S. IT Salary Survey. Upon completion of the survey, you will be eligible to enter a contest for prizes including a Bravia HDTV or iPad 2, and get a link to download our report once it is published.
Survey ends Jan. 20

Cloud Connect Is Coming!
Learn about the latest cloud technologies and platforms from industry leaders and thinkers at Cloud Connect. It takes place in Santa Clara, Calif., Feb. 13-16.
Get More Details And Register Today!

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.