SYS-CON MEDIA Authors: Adrian Bridgwater, Carmen Gonzalez, Dana Gardner, Elizabeth White, Yeshim Deniz

Article

Mobile Cyber Security News Weekly

Week of February 16, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Enterprise Mobility Asia News Weekly
Also read Field Mobility News Weekly
Also read M2M News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

Multiple vulnerabilities have been detected in popular browsers Google Chrome and Mozilla Firefox, and cyber-security sleuths have advised Internet users in the Indian cyberspace to guard against arbitrary activities on their systems. Read Original Content

The Obama administration recommends a uniform federal standard requiring businesses to quickly report thefts of electronic personal information, acting Assistant Attorney General Mythili Raman told a Senate Judiciary Committee hearing recently. Read Original Content

Israel's cyber-security industry has grown from a few dozen companies to more than 200 in just the past three years amid a flood of hacks targeted at the country. Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper - https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

According to a recent article by Info-Security Magazine, mobile malware continues to be the fastest-growing segment of the threat landscape, with the list of malicious Android apps now hitting the 10 million mark. Read Original Content

A recent study by Cisco indicates 99 percent of mobile malware attacks were targeted at Android devices. Users of Android devices also encountered other forms of malware such as phishing, likejacking and forcible redirect more than anybody else, at roughly a 71 percent share. Read Original Content

A purported vulnerability within the Snapchat mobile app is making some users very apprehensive today. According to the Los Angeles Times, a cyber security researcher says the vulnerability in question enables hackers to launch a denial-of-service attack aimed at iPhones. Read Original Content

IBM and Cisco became the latest multinationals to announce major investments in Israel's new cyber-security technology park in Beersheba. IBM said it would work with Ben Gurion University to establish what it called a Center of Excellence for Security and Protection of Infrastructure and Assets, where students and workers will learn cyber-security skills to ensure the safety of the digital future, the company said. Read Original Content

The UK is "lagging behind" in its attitude towards cyber security, research from BT has claimed, with only 17 percent of UK businesses seeing the threat of malicious online activity as a major priority compared to 41 percent in the US. Read Original Content

SlickLogin, a small Israeli start-up, announced it has been acquired by Google.  SlickLogin's technology replaces traditional usernames and passwords with high-frequency sound waves, inaudible to the human ear.Read Original Content

An experiment set up by NBC News reporter Richard Engel demonstrated this week how quickly Russian hackers can break into the laptops and other mobile devices of those traveling to Sochi for the Winter Olympics. In a report filed on NBC, Engel recounted how hackers broke into two brand new laptops shortly after he set them up at his hotel with the help of a cyber security expert. Read Original Content

Recent Articles by Kevin Benedict

If You Can't Support Strategic Enterprise Mobility - An Extinction Event Draweth Nigh
Kevin Benedict Interviews Digital Transformation Expert: Jitin Agarwal on Managing Digital Assets and Code Halos
Mobile Expert Interview: Mayank Mehta
Mobile Technology, Roman Roads and Legionaries - Director's Cut
My Themes in 2014 are Real-Time, Speed and Insight
Mobile Expert Interviews: Feedhenry's CEO Cathal McGloin
Bracing for Change with Enterprise Mobility

Webinars of Note (Recorded)

Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.

Whitepapers of Note

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
The True Cost of Mobility

*************************************************************

Kevin Benedict Senior Analyst, Digital Transformation Cognizant View my profile on LinkedIn Learn about mobile strategies at MobileEnterpriseStrategies.com Follow me on Twitter @krbenedict Browse the Mobile Solution Directory Join the Linkedin Group Strategic Enterprise Mobility

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

More Stories By Kevin Benedict

Kevin Benedict is the Senior Analyst for Digital Transformation at Cognizant, a writer, speaker and SAP Mentor Alumnus. Follow him on Twitter @krbenedict. He is a popular speaker around the world on the topic of digital transformation and enterprise mobility. He maintains a busy schedule researching, writing and speaking at events in North America, Asia and Europe. He has over 25 years of experience working in the enterprise IT solutions industry.

Latest Stories
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
In his session at WebRTC Summit, Peter Dunkley, Technical Director at Acision, will look at creating interactive communications via the web by adding messaging, file transfer, and group communication (group chat and audio/video conferencing) into the web experience. He will also discuss potential applications of this technology in areas including B2B, B2C, P2P, and gaming. Peter Dunkley is Technical Director at Acision. He graduated from The University of Edinburgh in 2000 with a BSc (Hons) in ...
What if, during a snow emergency, an on-the-ground sensor could automatically trigger a relevant emergency notification related to snowfall and road impact. And then, after it’s triggered, that notification is delivered intelligently to individuals based on an extensive set of rules designed to alert the most available and capable responders. This “what if” question about “smart highways” is short-sighted. We are already there, and we are only getting started. While mainstream attention is pai...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, will review the changes that the cloud computing industry has gone through over the last five years and share insights into what the next five will bring. He will chronicle the challenges enterprise companies are facing as they move to the public cloud. He will delve into the “Hybrid Cloud” space and explain why every CIO should consider ‘hybrid cloud’ as part of their future strategy to a...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
Avnet, Inc. has announced that it ranked No. 4 on the InformationWeek Elite 100 – a list of the top business technology innovators in the U.S. Avnet was recognized for the development of an innovative cloud-based training system that serves as the foundation for Avnet Academy – the company’s education and training organization focused on technical training around top IT vendor technologies. The development of this system allowed Avnet to quickly expand its IT-related training capabilities around...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
A new definition of Big Data & the practical applications of the defined components & associated technical architecture models This presentation introduces a new definition of Big Data, along with the practical applications of the defined components and associated technical architecture models. In his session at Big Data Expo, Tony Shan will start with looking into the concept of Big Data and tracing back the first definition by Doug Laney, and then he will dive deep into the description of 3V...
Why does developer experience matters, what makes for a great developer experience and what is the relationship between developer experience and the broader field of user experience? Software developers are gaining more influence over the purchase decisions of technologies with which they must build on and with which they must integrate. For example, the success of Amazon Web Services, Heroku and MongoDB has been driven primarily by individual software developers choosing to use these tools, ra...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
Chuck Piluso will present a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Speaker Bio: Prior to Data Storage Corporation (DSC), Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of ...