RefBan

Referral Banners

Tuesday, May 17, 2011

Teardown Reveals FBI GPS Auto-Tracker Secrets; Hackers Target Mobile Devices

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - May 17, 2011
Teardown Reveals FBI GPS Auto-Tracker Secrets
Hackers Target Mobile Devices
Microsoft Finds Phishing on Social Networks, Malware Attacks Increased
Android Malware Jumps 400% as All Mobile Threats Rise
Rackmount Server Targets LAN Security Threats
SPOTLIGHT
Chromebooks Steal Show at Google I/O
Google introduced notebooks based on the Chrome OS, which is a bold bet against Microsoft Windows and Apple's Mac.
READ MORE >>
BEST OF eWEEK
Why Motorola Delayed the Droid Bionic
Google I/O Delivers 'Honeycomb' 3.1, More
Samsung Droid Charge Impresses
Tiny Atomic Clock on a Chip Debuts
FEATURED VIDEO
Keep Up with Compliance
How you can stay ahead of rapidly evolving laws to avoid fines and sanctions.
WATCH NOW >>
MOST READ STORIES
Samsung's Series 5 Chromebook
Why iPad 3 Should Be Released This Year
Google Wants Your Home Web-Connected
Reasons to Adopt Adobe CS 5.5
IN THIS ISSUE
Teardown Reveals FBI GPS Auto-Tracker Secrets
In recent years, several motorists found entirely by chance that FBI agents had secretly installed GPS devices underneath their vehicles that were capable of constantly tracking a vehicle's location. Wired managed to get its hands on a tracker used by the FBI six years ago and turned it over to the teardown artists at iFixit, who disassembled the device. We show you what the folks at iFixit found.
READ MORE >>

Hackers Target Mobile Devices
Portable computers are one of several new hotspots in the war for information security. In fact, attacks targeting mobile devices are on the rise, and the overall threat environment grew yet more hostile in 2010, according to a recent Symantec report.
READ MORE >>

Sponsored by IBM


Most clouds aren't capable of supporting the types of workloads becoming increasingly common on a smarter planet. The IBM SmartCloud is different. It's designed to a myriad of workloads, including development and test environments.
Adopt a cloud that's ready for your business.
ADVERTISEMENT
Microsoft Finds Phishing on Social Networks, Malware Attacks Increased
Adware, fake antivirus scareware and phishing on social networking sites such as Facebook and MySpace became more prevalent from July to December 2010.
READ MORE >>

Android Malware Jumps 400% as All Mobile Threats Rise
Mobile security is the new malware battlefield as attackers take advantage of users who don't think their smartphones can get compromised.
READ MORE >>

Rackmount Server Targets LAN Security Threats
Designed for network security applications, VPN, firewall, antivirus, anti-spam, QoS, and streaming, Acrosser Technology's latest 1U rackmount network server can be equipped with Intel Core 2 quad-core or dual-core processors, as well as Pentium or Celeron CPUs.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
8 Considerations for Evaluating Disk-Based Backup
May 20, 2011 12:00 p.m. Eastern / 9:00 a.m. Pacific (60 minutes)
Join us for an interactive eSeminar where Jeff Crum, senior product manager at ExaGrid, and other industry experts will share eight key technological criteria to consider when evaluating systems.
REGISTER >>

Meeting the New Demands for Management & Security with All-In-One PCs
May 23, 2011 at 4:00 p.m. Eastern / 1:00 p.m. Pacific (60 minutes)
vPro is also the key to manage the security issues in a far more rigorous and comprehensive fashion due to increasing governance and compliance demands as well as new and evolving threats. Lenovo adds to vPro with their own unique solutions.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: