RefBan

Referral Banners

Thursday, June 2, 2011

iPhone 4 Encryption Uncracked, but Password Keys Easy to Get; Google Removes 26 Apps with DroidDream Light Malware

Don't miss a single issue of eWEEK.com Securing the Enterprise. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Securing the Enterprise Securing the Enterprise
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Security | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - June 2, 2011
iPhone 4 Encryption Remains Uncracked, but Password Keys Easy to Get
Google Removes 26 Apps with DroidDream Light Malware
Apple Rolls Out MacDefender Removal Tool for Mac OS X
Security Obstacles Remain for Data Center Virtualization
Lockheed Martin Shuts Down Remote Network Access After Intrusion
SPOTLIGHT
Galaxy Tab 10.1: Fine iPad Alternative
Expected to launch in June to challenge the iPad, Samsung's Galaxy Tab 10.1 could restore faith in Android tablets.
READ MORE >>
BEST OF eWEEK
Droid X2: Best of the Old with the New
Mango Update Sweetens Windows Phone
10 Biggest Data Breaches of 2011 So Far
Smarter eEyes Focus on Cure for Blind
FEATURED VIDEO
Time to Work from Home
Laptops, tablets, and smart devices help blur the line between office and home.
WATCH NOW >>
MOST READ STORIES
Why iPad 3 Should Be Released This Year
Why Motorola Delayed the Droid Bionic
iPhone 5 Uncertain, so Buy iPhone 4
How to Recognize Phishing Attacks
IN THIS ISSUE
iPhone 4 Encryption Remains Uncracked, but Password Keys Easy to Get
Russian company ElcomSoft hasn't cracked AES-256 encryption but figured out a way to obtain the cryptographic keys necessary to decrypt all the data on Apple iOS devices.
READ MORE >>

Google Removes 26 Apps with DroidDream Light Malware
The DroidDream gang is back on the Android Market, this time with a stripped-down version of the malware. Google has removed the 26 apps identified so far.
READ MORE >>

Sponsored by VeriSign


The world's leading SSL certificates now offer more protection and security. Now from Symantec. The VeriSign seal is displayed more than 250 million times a day on more than 90,000 websites and inspires confidence among your customer base when on your site.
Start your free trial at verisign.com/ssl/free-30day-trial
ADVERTISEMENT
Apple Rolls Out MacDefender Removal Tool for Mac OS X
Apple releases a security upgrade that adds the MacDefender definition to File Quarantine along with an update feature that will refresh malware definitions to keep up with emerging threats and a malware removal tool.
READ MORE >>

Security Obstacles Remain for Data Center Virtualization
Organizations need to think about virtualization-specific security technology when upgrading their data centers instead of relying on existing measures, such as the trust firewall.
READ MORE >>

Lockheed Martin Shuts Down Remote Network Access After Intrusion
Defense contractor Lockheed Martin is dealing with problems in its internal network after a suspected intrusion reportedly using the RSA SecurID tokens.
READ MORE >>

Featured White Papers
Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>

How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Securing the Enterprise newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receive eWEEK.com Securing the Enterprise, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: