Mercado seguridad...
Follow
Find tag "BYOD"
12.8K views | +10 today
Mercado seguridad TIC
Seguridad de la información, seguridad TIC, scada, infraestructuras críticas, SGSI, Protección datos personales,
Curated by Elisa Vivancos
Your new post is loading...
Your new post is loading...
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Infosecurity - Apple iOS 7: A Security Overview

Infosecurity - Apple iOS 7: A Security Overview | Mercado seguridad TIC | Scoop.it
Apple's new iOS 7, pre-loaded on the new iPhone 5s and 5c, is also available for download to older devices. It is said to include more than 200 new features – here we look at some of the security aspects and issues.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

Obad.a Trojan now being distributed via mobile botnets

Obad.a Trojan now being distributed via mobile botnets | Mercado seguridad TIC | Scoop.it
In late May we reported on the details of Backdoor.AndroidOS.Obad.a, the most sophisticated mobile Trojan to date. At the time we had almost no information about how this piece of malware gets onto mobile devices.

Via Gust MEES
more...
Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

83% Of Mobile Apps Are Risky

83% Of Mobile Apps Are Risky | Mercado seguridad TIC | Scoop.it
Summer 2013 App Reputation Report to examine the hidden behaviors behind free and paid mobile apps

 

The cloud-based, fully automated Appthority App Risk Management Service performed static, dynamic and behavioral app analysis on the 400 most popular free and paid apps on the iOS and Android platforms.

 

  

Appthority analyzed each app for particular behaviors within a test environment

.

Highlights from the App Reputation Report are:

 

- Overall, 83% of the most popular apps are associated with security risks and privacy issues.

 

- iOS apps exhibited more risky behaviors than Android apps. 91% of iOS apps exhibit at least one risky behavior, as compared to 80% of Android apps.

 

- 95% of the top free apps and 77.5% of the top paid apps exhibited at least one risky behavior.

 

- 78% of the most popular free Android apps identify the user's ID (UDID).

 

- Even though Apple prohibits its developers from accessing the UDID, 5.5% of the tested iOS apps still do.

 

- 72% of the top free apps track for the user's location, compared to 41% of paid apps.

 

- Although paid apps already generate revenue when downloaded, 59% of paid iOS and 24% of paid Android apps still support in-app purchasing.

 

- Furthermore, 39% of paid iOS and 16% of paid Android apps still share data with ad networks.

 


Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Customized spam uses cell phone users’ data against them

Customized spam uses cell phone users’ data against them | Mercado seguridad TIC | Scoop.it

US mobile spammers are using cell phone users’ personal data to launch invasive, highly targeted attacks, according to AdaptiveMobile.

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 


Via Gust MEES
more...
Gust MEES's curator insight, June 19, 2013 9:03 AM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.


A MUST read!!!

 

Gust MEES's curator insight, June 19, 2013 9:06 AM

 

For the first time, mobile spammers can use such information as the subscriber’s first name, zip code, income level, and ethnicity to make attacks personalized and more effective.

 

A MUST read!!!

 

Rescooped by Elisa Vivancos from 21st Century Tools for Teaching-People and Learners
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | Mercado seguridad TIC | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...

Via Gust MEES
more...
Gust MEES's curator insight, April 14, 2013 6:22 AM

 

Awareness and Protection!!!

 

Gust MEES's curator insight, April 14, 2013 6:25 AM

 

Awareness and Protection!!!


Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

The Executive's Guide to BYOD and the Consumerization of IT (free ebook)

The Executive's Guide to BYOD and the Consumerization of IT (free ebook) | Mercado seguridad TIC | Scoop.it
The 'bring your own device' phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. This ebook rounds up our best BYOD content and puts it all into a convenient PDF.

Via Gust MEES
more...
Scooped by Elisa Vivancos
Scoop.it!

El 80 por ciento del BYOD está sin gestionar - Dealer World

El 80 por ciento del BYOD está sin gestionar - Dealer World | Mercado seguridad TIC | Scoop.it
Un estudio de Ovum asegura que, que mientras que el 70 por ciento de los usuarios utilizan sus propios smartphones para actividades profesionales, el ...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

¿BYOD o un elefante en un departamento TIC? | Telecomunicaciones para Gerentes

¿BYOD o un elefante en un departamento TIC? | Telecomunicaciones para Gerentes | Mercado seguridad TIC | Scoop.it
La seguridad de datos en las redes empresariales no está garantizada con la entrada de BYOD sobre infraestructuras TIC convencionales.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

El 80% de la actividad derivada de BYOD es insegura

El 80% de la actividad derivada de BYOD es insegura | Mercado seguridad TIC | Scoop.it
Las economías maduras son las más ignorantes en cuanto a gestión y adopción de la tendencia.The post El 80% de la actividad derivada de BYOD es insegura appeared first on Silicon News.
more...
No comment yet.
Rescooped by Elisa Vivancos from The Daily Information Security Dose
Scoop.it!

The Path To Better BYOD | Visual.ly

The Path To Better BYOD | Visual.ly | Mercado seguridad TIC | Scoop.it
We've examined the differences between the user experience and the IT experience when implementing a BYOD strategy.
Via Joerg Asma
more...
No comment yet.
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Infographic: Q&A on Information Security Workforce

Infographic: Q&A on Information Security Workforce | Mercado seguridad TIC | Scoop.it
(ISC)2 conducted a worldwide survey in the last quarter of 2012 called 2013 Global Information Security Workforce Study. Our newest infographic presents some of the study’s highlights in an easy-to-read question & answer format.

Via Praetorian Guard, Gust MEES
more...
Rescooped by Elisa Vivancos from 21st Century Learning and Teaching
Scoop.it!

USB flash drives masquerading as keyboards mean more BYOD security headaches

USB flash drives masquerading as keyboards mean more BYOD security headaches | Mercado seguridad TIC | Scoop.it

 

 

Hackers have come up with an ingenious way to bypass the Microsoft's AutoRun protection measures present on Windows 7 and Windows 8 by making the flash drive pretend it's a keyboard.

 

 

 

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 


Via Gust MEES
more...
Gust MEES's curator insight, July 30, 2013 1:45 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Gust MEES's curator insight, July 30, 2013 1:48 PM

 

===> Think you're safe because you use OS X or Linux? Think again! There are devices being marketed that claim to be able to get infiltrate these operating systems too. <===

 

Nobody Is Perfect!!!

 

Rescooped by Elisa Vivancos from Apple, Mac, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Why You Need Mac Antivirus Software

Why You Need Mac Antivirus Software | Mercado seguridad TIC | Scoop.it
From social networking to online shopping, banking, and surfing the web – precautions are needed to ensure our phones and our information are safe from malware attacks and cybercriminals. Learn more about smartphone security.

Via Gust MEES
more...
Gust MEES's curator insight, July 7, 2013 2:01 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Gust MEES's curator insight, July 7, 2013 2:04 AM

 

Why You Need Mac Antivirus Software.

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

Mobile Threat in Action [INFOGRAPHIC]

Mobile Threat in Action [INFOGRAPHIC] | Mercado seguridad TIC | Scoop.it
INFOGRAPHIC: Mobile Threat in Action

Via Gust MEES
more...
Rescooped by Elisa Vivancos from ICT Security-Sécurité PC et Internet
Scoop.it!

The second most important BYOD security defense: user awareness

The second most important BYOD security defense: user awareness | Mercado seguridad TIC | Scoop.it
Outside of the IT department, most users think that viruses are the only threat to their computing equipment. Many believe that malware doesn't affect mobile devices at all. An educated user is a safer user.

Via Gust MEES
more...
Gust MEES's curator insight, March 4, 2013 1:07 PM

 

                 ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Gust MEES's curator insight, March 4, 2013 1:12 PM

 

                ===> An educated user is a safer user. <===

 

Most of them apply also to schools...

 

A very important point, with most people don't apply BUT which is necessary, a MUST is:

 

Educate your users - "The second most important BYOD security defense: user awareness, ...it might be the most important non-hardware, non-software solution available. An informed user is a user who behaves more responsibly and takes fewer risks with valuable company data, including email."

 

http://www.zdnet.com/the-second-most-important-byod-security-defense-user-awareness-7000011738/

 

 

Check also:

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

Rescooped by Elisa Vivancos from 21st Century Tools for Teaching-People and Learners
Scoop.it!

20 security and privacy apps for Androids and iPhones

20 security and privacy apps for Androids and iPhones | Mercado seguridad TIC | Scoop.it
Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more, a MUST:

http://www.csoonline.com/slideshow/detail/66493/20-security-and-privacy-apps-for-Androids-and-iPhones-

 


Via Gust MEES
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Decálogo para conseguir una política BYOD segura

Decálogo para conseguir una política BYOD segura | Mercado seguridad TIC | Scoop.it
El fenómeno Bring Your Own Device BYOD (traiga su dispositivo al trabajo) sigue al alza y según consultoras como Forrester, no es una moda pasajera y en tres años se convertirá en una política estándar e incluso en un requisito para las nuevas...
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

El 80% de la actividad derivada de BYOD es insegura

El ya roído fenómeno BYOD se está convirtiendo en mainstream. Ya el 70% de los profesionales con un smartphone utilizan su dispositivo personal para acceder a información corporativa, según un estudio de la consultora Ovum.
more...
No comment yet.
Scooped by Elisa Vivancos
Scoop.it!

Fortinet refuerza la seguridad en entornos BYOD con FortiOS 5.0

Fortinet refuerza la seguridad en entornos BYOD con FortiOS 5.0 | Mercado seguridad TIC | Scoop.it
Fortinet lanza FortiOS 5.0, una nueva versión de su sistema operativo que incorpora nuevas características de seguridad para reforzar el control y la inteligencia frente a amenazas avanzadas y, sobre todo, para mejorar la protección en entornos BYOD.
more...
No comment yet.