Android Malware: Beware Counterclank | Google Fights Phishing

Android Malware: Beware Counterclank | Google Fights Phishing

January 30, 2012

14 Min Read
Network Computing logo

  Monday, January 30, 2012

REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  

MUST READ
Between The Lines Columnist Google, Microsoft Say DMARC Spec Stops Phishing
By Thomas Claburn
New email authentication framework called DMARC, backed by major email and security tool providers, aims to make spoofed domains in messages a thing of the past.

RELATED
Aggressive Phishing Attack Targets Military Personnel
9 Ways To Minimize Data Breach Fallout

Android Counterclank: Malware, Or Smartphone Advertising?
Apperhand SDK drops a search icon onto the Android desktop and tracks your device's ID, but so does any adware. Here's what you need to know.

Kindle Fire Sales Hit 6 Million In Q4
Amazon’s Android-based tablet expected to boost year-end revenues, which the company is slated to report Tuesday.

Time To Scrap SSL?
Many security experts believe the Internet's trust model is broken. Figuring out how to fix it will take time and collaboration.

Commodity Hardware Meets Mission-Critical Apps: Success Story
Here's how First American Title Insurance saved $800,000 by exchanging its HP Superdome hardware for commodity x86 servers, and resisted pressure to move from SQL to Oracle database technology.

Google, Microsoft Say DMARC Spec Stops Phishing
New email authentication framework called DMARC, backed by major email and security tool providers, aims to make spoofed domains in messages a thing of the past.

Coke Super Bowl Campaign Blends TV, Tablets And Smart Phones
Coca-Cola's animated polar bears seen on TV will 'respond' to Facebook and Twitter comments and post fan photos and videos as part of a social-media-integrated campaign.

BroadSoft To Deliver UC Platform For Service Providers
Business Communicator brings voice, video, IM, text into one interface.

MORE NEWS

QUOTE OF THE DAY
Borrowing is not much better than begging; just as lending with interest is not much better than stealing. -- Doris Lessing

ALSO SEE


WE INVITE YOU TO...
"The Innovative CIO: Leadership, Innovation, and Global Change," an executive education program running in March at Stanford University. The three-day program includes keynote, classroom, and other hands-on sessions focused on the CIO's role in driving innovation.
Get More Details And Register To Attend

JOIN THE CONVERSATION
Posted By LifeGrapher:
"Microsoft is the company that built an OS where you had to hit a button labeled "Start" in order to shut your system down. Does anyone really want to buy a mobile phone with their software on it?"
In reply to: "Why RIM Should Cut BlackBerry Losses"
View Entire Response | Post Your Own Reply

Click here to visit: Channelweb

 

ANALYTICS & WHITEPAPERS

FEATURED REPORTS
IT Pro Impact: NFC and Mobile Commerce
Apple, RIM, Google and other smartphone makers are adding near field communication capabilities to their devices for release in 2012. Enterprise mobility teams should be ready to advise business leaders on how to incorporate mobile commerce into the organization's plans.
Download Now (Registration Required)

Featured Report

Fundamentals: Application Virtualization
The evolution of virtualization has exposed complexities in application distribution and management that we couldn't have imagined in the days of disposable disk images. Our report will help you get started.
Download Now (Registration Required)

Featured Report



spacer

spacer

spacer

FEATURED WHITEPAPERS
Malware War: How Malicious Code Authors Battle to Evade Detection
The stakes have never been higher in the fight for control of corporate and consumer devices between malicious code and the antimalware software designed to detect and stop it. It's a war of one-upsmanship, as security labs work 'round the clock to analyze malicious code and the bad guys design new, ingenious ways to frustrate analysts and automated tools. This Tech Center report covers the key methods malware writers use to thwart analysis and evade detection.
Download Now (Registration Required)

The Business Case for Managed DDoS Protection
Discover how DDoS attacks are getting larger, more sophisticated and dangerous. Learn the risks to Internet infrastructure, revenues and brand equity. See how those risks multiply the more your business depends on the Web. This white paper also includes an ROI study which outlines the business case for using a cloud-based managed service. You'll be surprised to learn how quickly the right solution can pay itself, sparing your business substantial revenue losses and PR issues.
Download Now (Registration Required)

 

MOST POPULAR NEWS

Smartphone, Tablet Races: 4 Telling Numbers
Hardware makers and network operators provided insight on adoption of the hottest mobile platforms--Android and iOS--via financial reports this week. Here are four things we learned.

Nokia Numbers Show Microsoft’s Mobile Madness
Every Windows Phone 7 device Nokia shipped in Q4 cost Microsoft $250, minus a royalty. But Microsoft is burning this cash with good reason.

6 Predictions For Business Intelligence In 2012
A look at in-memory analysis, visual discovery, big data, mobile BI, cloud and social BI achievements in 2011 and forecasts for the year ahead.

Apple iPad: Happy 2nd Birthday
Apple changed the way we think about computing and digital devices--again--when it introduced the iPad tablet in early 2010. Take a look back and a peek ahead.

Why Personal Health Records Have Flopped
It's not a security, privacy, or data-sharing problem. It's a patient problem.


 


SLIDESHOWS

Apple iPad: Happy 2nd Birthday
Apple changed the way we think about computing and digital devices--again--when it introduced the iPad tablet in early 2010. Take a look back and a peek ahead.   View Now

ALSO SEE
12 Hadoop Vendors To Watch In 2012
7 Tools To Tighten Healthcare Data Security

MORE SLIDESHOWS

spacer

spacer

spacer

spacer

 

WEBCASTS

Big Data Management Best Practices That Boost Online Performance
Join Gary Angel, president and CTO of Semphonic, as he details how you can identify the real factors driving online performance and determine the best way to improve results -- with robust, fast data analysis. It happens January 31, 2012. More Information & Registration

MORE WEBCASTS

Click here

 

RESOURCES AND EVENTS

Virtual Event: Clouds, Outsourcing, And Security Services
Join us on Feb. 15 for the our virtual event 'Clouds, Outsourcing, And Security Services': Making Providers Part of Your IT Security Strategy. When you attend, you will be able to access live and on-demand webcast presentations as well as virtual booths packed with free resources, and you can also be eligible to win great prizes!
Register Now


InformationWeek 500 2012: Call For Nominations!
We've started accepting nominations for this year's InformationWeek 500 -- our 24th annual ranking of the nation's very best business technology innovators. Orgs with $250 million or more in revenue may apply now!
Deadline is April 27 -- Don't Miss It!

This e-mail was sent to EmailAddress

INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe


SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox
More Insights