RefBan

Referral Banners

Thursday, March 17, 2011

How Google Can Shore Up Android Market App Security; Adobe Promises Flash, Acrobat, Reader Fix for Zero-Day Bug

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - March 17, 2011
How Google Can Shore Up Android Market App Security
Adobe Promises Flash, Acrobat, Reader Fix for Zero-Day Bug
Intel-McAfee Combo Targets Embedded Devices, Mobile Security
Japan Earthquake Triggers Radiation, Toxic Rain Web Hoaxes
Twitter Supports HTTPS Encryption to Bolster Security
SPOTLIGHT
10 Key Missing Features in iPad 2
The iPad 2 might be an update, but it's not as big of a jump over its predecessor as some want to believe.
READ MORE >>
BEST OF eWEEK
Xoom Unleashes Graphical Firepower
Jobs Taunts Google, Amazon with iPad 2
Remote Access Challenges, Benefits
Eye-Controlled Laptop Tracks Your Gaze
FEATURED VIDEO
Keep Up with Compliance
How you can stay ahead of rapidly evolving laws to avoid fines and sanctions.
WATCH NOW >>
MOST READ STORIES
Google Maps Charts Japan Devastation
IE 9 Offers Speedy Cruising, Modern Look
Hot Adobe Labs Projects in the Works
Features We Expect to See in iPhone 5
IN THIS ISSUE
How Google Can Shore Up Android Market App Security
As an open-source platform where Google lets developers write code with great freedom and flexibility, Android is an ideal target for malicious developers and hackers attempting to dupe people or simply mess around with the Android Market applications. And recent events have proven that. We talked to some experts to find out how Google can improve security in its Android Market.
READ MORE >>

Adobe Promises Flash, Acrobat, Reader Fix for Zero-Day Bug
Adobe issued a security bulletin about a critical vulnerability that could compromise user systems and promised a fix next week. An exploit already exists as an Excel spreadsheet with Flash embedded.
READ MORE >>

Sponsored by LogMeIn


You need the ability to instantly support more users on today's most popular platforms--including iPhones, iPads, and Android devices. LogMeIn Rescue can help. Download LogMeIn Rescue for free, and start providing complete on-demand remote support without pre-installing any software.
Download here.
ADVERTISEMENT
Intel-McAfee Combo Targets Embedded Devices, Mobile Security
Intel and McAfee executives talked about the combined patent portfolio that allowed them to focus on providing security from the hardware level in embedded and mobile devices.
READ MORE >>

Japan Earthquake Triggers Radiation, Toxic Rain Web Hoaxes
Radiation, toxic rain, bogus fund-raising pages, Twitter death news and other hoaxes clogged e-mail inboxes and social networking sites after Japan's earthquake and tsunami.
READ MORE >>

Twitter Supports HTTPS Encryption to Bolster Security
Twitter is following the lead of Facebook and Google by adding new encryption features provided by the HTTPS Internet protocol to improve security.
READ MORE >>

Featured White Papers
The 2010 IT Security Watch List: Know Your Enemies
IT security doesn't always stay at the top of your mind, but when the headlines about security breaches hit the news you may start to wonder (again) about the security of your IT infrastructure.
DOWNLOAD NOW >>

How to Secure & Audit Oracle 10g & 11g Databases
SQL injection, Zeus botnets, insider threats and new data protection regulations require tighter controls to secure high-value databases. Download this white paper to learn how to keep these and other threats from breaching your database perimeter.
DOWNLOAD NOW >>


Featured Webcasts
DR Emergency: Cures for Common DR Problems
Mar 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
Join us for a live, interactive eSeminar to find out how you can overcome these constraints to realize the full potential of your architecture and wide-area networks (WAN). Attend this online-only event to learn how you can re-architect your data protection and disaster recovery strategies.
REGISTER >>

Smart Ways to Incorporate Social Networking Into Your Enterprise
Mar 29, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Social networking is not a fad - and it is not going away! Millennials entering the workforce have embraced this medium as a way to communicate both personally and professionally. It is time for companies to catch up and properly integrate social networking into their enterprises or risk being left behind.
REGISTER >>


Sign up for complimentary subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360° view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: