Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Android Malware's Costly Twist | Apple's Walled Garden Failing

InformationWeek Daily
InformationWeek Daily  
  Monday, February 6, 2012
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines Columnist Apple's Walled Garden: Sledgehammer Needed
By Jonathan Feldman
Friday's revelation of an iOS app with a "hidden" tethering capability shows that walled garden restrictions don't necessarily keep us safer. They do create a monopoly and planned obsolescence. It's time to break down those walls.

RELATED
iPhone App Contains Secret Tethering Capability
There's No App For That, And That's Good

New Android Malware Has Costly Twist
"Polymorphic" malware, tweaked frequently, sends SMS texts to premium-rate numbers until smartphone owner's account balance is depleted.

Nokia Lumia 900 Pre-Orders Begin
Windows Phone fans who want to get their hands on the Lumia 900 smartphone can reserve one with a $25 deposit at Microsoft stores.

Steve Appleton, Survivor
The man who led the improbable little startup called Micron Technology leaves a big legacy.

The Next Big Social Network Is You
Three trends just now emerging will alter the social network landscape.

Interpol Preps Gobal Cybercrime Center
Singapore-based center, set to open in 2014, aims to strengthen international cybercrime investigations.

Nicira OpenFlow: Networking's Next Big Thing?
$40-million startup emerges with OpenFlow platform for virtualizating the network as effectively as servers.

SoftLayer: A New Kind Of Cloud Service
SoftLayer's customers can move data with the click of a button from virtual servers to physical and back, whenever they choose, in SoftLayer data centers.

QUOTE OF THE DAY
Actually, the moment of victory is wonderful, but also sad. It means that your trip is ended. -- Bill Toomey

ALSO SEE

Nicira OpenFlow: Networking's Next Big Thing?
SoftLayer: A New Kind Of Cloud Service
Research: 2012 State of Cloud Computing
In-House Malware Analysis: Why You Need It, How to Do It
6 Predictions For Business Intelligence In 2012
Don't Get Hooked by the Latest Phishing Attacks
Take Our Alternative Application Delivery Survey

JOIN THE CONVERSATION
Posted By Red.Foxx15:
"What has me attracted to iOS right now is that majority of the apps that you have on your iphone 3gs will work on the 4s and will work on your choice of the tablets apple offers as well."
In reply to: "Microsoft Windows 8 Unification Plan: Grand, But Risky"
View Entire Response | Post Your Own Reply

Posted By da cappin:
"$3000 to do what GOOD Technology can do for $100 per seat? Who's managing the budget over there. Hello FIPS-2!"
In reply to: "National Security Agency Plans Smartphone Adoption"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD INFORMATIONWEEK'S FEBRUARY 6th DIGITAL ISSUE
IT's jumping into cloud services with too much custom code and too little planning, our annual State of Cloud Computing Survey finds. Our newest digital issue shows you what to be aware of when using the cloud.

Also in this issue: Cloud success stories from Six Flags and Yelp, and how to write a SAN RFI.

DOWNLOAD NOW (Registration Required)

 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
Research: 2012 State of Cloud Computing
In this report, we lay out the critical steps every organization needs to take to make sure its cloud leap goes on more than just faith.
Download Now (Registration Required)

Featured Report
IT Pro Ranking: Endpoint Antivirus/Anti-Malware
46% of respondents to our survey are considering replacing or adding a vendor. Lucky for them, choices abound in this market.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
In-House Malware Analysis: Why You Need It, How to Do It
Vulnerability management identifies and closes exploitable holes in your enterprise network. But some systems remain vulnerable, and traditional antivirus and perimeter defenses are proving less effective against sophisticated malware, targeted attacks and zero-day exploits. In this report, we show you how malware analysis, tied closely to incident response, is an essential complement to enterprise vulnerability management programs.
Download Now (Registration Required)

The Time Is Now for Workload Automation
Organizations are faced with endless pressure to lower infrastructure costs while improving quality of service (QoS) capabilities. This paper examines the evolution of IT organizations as they move from static batch processing to dynamic workload automation capabilities that integrate with business processes and trigger revenue-generating actions based on real-time requests.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
6 Predictions For Business Intelligence In 2012
A look at in-memory analysis, visual discovery, big data, mobile BI, cloud and social BI achievements in 2011 and forecasts for the year ahead.

How IT Views RIM's Future: Exclusive Research
IT professionals have strong feelings about RIM, its products, and its plight. But the real issue is end user device preference.

iPhone App Contains Secret Tethering Capability
By entering the codes "1984" and "31337" in iRandomizer Numbers, you can create a sharable Internet connection using your iPhone.

9 Security Technologies For Super Bowl And Beyond
From the Super Bowl to the World Cup, sports fans are being watched in new ways. Consider these technologies changing sports security.

Microsoft Windows 8 Unification Plan: Grand, But Risky
Windows 8 and Windows Phone 8 appear to look very much alike. That's great news for users, but can Redmond pull off one OS across desktops, mobile and more?

 


SLIDESHOWS
How IT Views RIM's Future: Exclusive Research
IT professionals have strong feelings about RIM, its products, and its plight. But the real issue is end user device preference.   View Now

ALSO SEE
9 Security Technologies For Super Bowl And Beyond
How To Do Cloud Apps With Microsoft

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Three Hot Gadgets: Basis Watch, HP Ultrabook, Lytro Camera
Video demonstrations of Basis health monitoring wristwatch, Lytro camera (which captures the entire light field) and HP's high-end Ultrabook, the Envy Spectre 14. These were some of the hottest gadgets we saw at CES 2012.   Watch

ALSO WATCH
Tech News: It's All A Joke
SAP's Bold Desires: Leadership In Cloud, Mobile, Big Data

MORE VIDEOS

spacer
 


WEBCASTS
Don't Get Hooked by the Latest Phishing Attacks
Attend this live webinar to learn about the latest trends in phishing attacks and how you can keep your organization safe. It happens Wednesday, February 22, 2012. More Information & Registration

 


RESOURCES AND EVENTS
Take Our Alternative Application Delivery Survey
InformationWeek is conducting a survey exploring alternative application architecture strategies. Upon completion of our survey, you will be eligible to enter a drawing to receive an Apple 32-GB iPod Touch.
Survey ends Feb. 10

Virtual Event: Social Analytics: The Bridge To Business Value
Social media are generating tons of data, but that data only becomes truly valuable when examined in context. Attend this virtual Enterprise 2.0 event and learn how social analytics will provide the bridge to unlocking business value.
It happens Feb. 16


This e-mail was sent to EmailAddress
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.