RefBan

Referral Banners

Tuesday, August 16, 2011

The World's Top 10 'Groundbreaking' Hackers; Android Trojan Stealthily Answers Incoming Calls

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - August 16, 2011
The World's Top 10 'Groundbreaking' Hackers
Android Trojan Stealthily Answers Incoming Calls
Hackers Shift From Petty Vandalism to Massive Data Theft
RIM Patches BlackBerry Enterprise Server to Fix PNG, TIFF Bugs
Google Sets Deadline for Enforcing Real Name Policy
SPOTLIGHT
Why iPhone 5 Fever Is Catching
Without actually releasing a new product or even hinting that it will, Apple has managed to begin building excitement. See why.
READ MORE >>
BEST OF eWEEK
Give Your System Administrators a Break
How Your Mobile Carrier Is Hurting You
iCloud.com Kicks Off Apple's Cloud Push
Seven Reasons HTML5 Is Killing Flash
FEATURED VIDEO
Hot Mobile Trends for SMBs
What SMBs need to know to not be left behind in the mobile wave.
WATCH NOW >>
MOST READ STORIES
iPhone 5 Features Most Likely on Tap
10 Must-Have Google Apps for iPhone
iOS 5 Beta Brings Fresh New Features
Google Feeling Crowded by Enemies
IN THIS ISSUE
The World's Top 10 'Groundbreaking' Hackers
Every security professional worth his or her salt has a list of the top hackers of all time. Some lists may focus on complexity of the attack and others may emphasize the amount of damage caused. The individuals on this list from Alan Wlasuk, a managing partner of 403 Security, are considered to have engaged in hacks that were ground-breaking at the time.
READ MORE >>

Android Trojan Stealthily Answers Incoming Calls
The latest Nickispy variant can intercept incoming calls without the user's knowledge while sending call logs, text messages and other information to a remote server. Known as ADROIDOS_NICKISPY.C, the Trojan displays a Google+ icon on the handset and is installed under the name Google++.
READ MORE >>

Sponsored by IBM


Work smarter to get the maximum out of your ideas at smartertechnology.com. News, information, and resources for your IT needs.
Learn more
ADVERTISEMENT
Hackers Shift From Petty Vandalism to Massive Data Theft
Cyber-attackers are hitting higher-profile targets and exposing ever-larger volumes of data, whether for financial gain, strategic advantage or to espouse "hacktivist" causes.
READ MORE >>

RIM Patches BlackBerry Enterprise Server to Fix PNG, TIFF Bugs
Research In Motion closed several critical bugs in how MDS Connection Service and the Messaging Agent process PNG and TIFF image files on the BlackBerry Enterprise Server.
READ MORE >>

Google Sets Deadline for Enforcing Real Name Policy
Google+ users who opt to use fake profile names will get a 4-day grace period to shape up or ship out. Google will suspend the accounts of those not in compliance. Google started a minor furor last month when it began suspending accounts of those it believes were pseudonyms or fake names.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
The Secrets To Creating A Successful Social Networking Initiative That Actually Makes Money
Sep 27, 2011 at 3:00 p.m. Eastern / 12:00 p.m. Pacific (60 minutes)
Organizations need to embrace social media as a direct extension of their organization and put resources behind that drive value and can ultimately be monetized. There are also security, compliance and corporate governance polices that need to be established and communicated upfront.
REGISTER >>

Smarter Security: Prioritize Your IT Investments & Guard Your Data
Aug 30, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
While every company has different risk tolerance levels, any downtown equals lost business. Organizations need to protect their data regardless of where it resides. The loss of data can cripple an organization.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Update Account Information

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: