ICT Security-Sécurité PC et Internet
87.1K views | +0 today
Follow
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Security is changing, organizations are unprepared - BYOD

Security is changing, organizations are unprepared - BYOD | ICT Security-Sécurité PC et Internet | Scoop.it

F5 Networks announced the findings of its 2013 RSA Security Trends Survey, which revealed that organizations are struggling to keep pace with the changing face of security. Respondents were RSA attendees with IT responsibilities over planning, management, oversight, or implementation of security.


BYOD is seen as critical in an organization’s ability to achieve the level of security it desires, yet a sizeable number of organizations are not taking the appropriate steps to address it.

Most (75%) see BYOD as being prevalent in their organization.Furthermore, two-thirds (66%) see BYOD as having a somewhat to extremely high impact on security.Despite this, one-third (35%) say they are not prepared to provide adequate security to protect against threats associated with BYOD.




Gust MEES's insight:

Check also:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD

Top Mobile Vulnerabilities And Exploits Of 2012 - #BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Spoofing, banking attacks, authentication flaws, and more top the list of 2012's biggest mobile security headaches
Scooped by Gust MEES
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | ICT Security-Sécurité PC et Internet | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.
No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD savings may be lost by security and admin costs

BYOD savings may be lost by security and admin costs | ICT Security-Sécurité PC et Internet | Scoop.it
BYOD savings may be lost by security and admin costs
Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort.

 

The Aberdeen Group found that BYOD, on average, costs companies 33 percent more than adopting a company-owned device policy. This is particularly surprising because, at first glance, BYOD seems to be the ultimate cost saver.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22614-BYOD-savings-may-be-lost-by-security-and-admin-costs.html?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole | ICT Security-Sécurité PC et Internet | Scoop.it
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

 

In fact, it seems the only group not excited about BYOD is IT – the ones who have to figure out how to keep sensitive corporate information safe. IT's consternation over BYOD is made worse by the fact that many think mobile device management (MDM) is the only tool available to contain the risks associated with BYOD, which is not the case.

 

MDM will always have a place in the enterprise because BYOD will simply never be the right approach for every employee. However, when it comes to BYOD implementations, MDM is not ideal. Thankfully, a better option exists. Mobile application management (MAM) presents an intriguing option for preparing for and avoiding the hazards of BYOD.

 

Read more, a MUST:

http://www.scmarketscope.com/mdm-and-byod-a-square-peg-for-a-round-hole/article/260623/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Sophos rolls out mobile apps for anti-malware and encryption

Sophos rolls out mobile apps for anti-malware and encryption | ICT Security-Sécurité PC et Internet | Scoop.it
Antivirus app for Android expected to be integrated into Sophos mobile-device management...
No comment yet.
Scooped by Gust MEES
Scoop.it!

Endpoint Security for BYOD

Endpoint Security for BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Everyone wants to bring personal devices into the workplace; these tips will help keep your network secure.

 

From iPhones and Android devices to tablets and notebooks, employees are increasingly bringing devices from home to the office for both work and personal reasons. Once they arrive, they expect to be able to join those devices to the network, ­either to access shared resources or simply to connect to the Internet. Whatever an agency’s stance on the “bring your own device”(BYOD) trend, a few simple tips can help protect the network.

 

Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Read more:

http://www.fedtechmagazine.com/article/2012/01/endpoint-security-byod

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

As BYOD Trend Grows So Do Malware Attacks

As BYOD Trend Grows So Do Malware Attacks | ICT Security-Sécurité PC et Internet | Scoop.it
As BYOD Trend Grows So Do Malware Attacks
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected.

 

The BYOD concept has been a growing trend for some years now as employees become more accustomed to using their own mobile computing devices in their jobs, and accessing corporate assets.

The rapid adoption of high end smartphones and tablets including iPhones, iPads and Android devices along with the number of easily accessible apps is driving this concept forward. Cloud based services, accessible from almost anywhere, are also a key factor.

The ‘Mobile Security Strategies: Threats, Solutions & Market Forecasts 2012-2017’ report report from Juniper found that while this trend can bring productivity benefits to businesses, it also poses potential security risks.

 

In particular, the report found that the majority of employee’s phones and smart devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions.

 

The war on cybercrime therefore continues for many organizations and especially their IT departments and CISOs. The total number of Computer viruses, trojans and web attacks is growing at their fastest pace in four years.

 

Read more, a MUST:

http://www.infosecisland.com/blogview/22364-As-BYOD-Trend-Grows-So-Do-Malware-Attacks.html?utm_source=dlvr.it&utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

How to Launch a Successful BYOD Program

How to Launch a Successful BYOD Program | ICT Security-Sécurité PC et Internet | Scoop.it


Katy Independent School District (ISD) has a student population of 63,000 students and 56 schools – elementary, middle and high schools. There are 83 languages spoken by students in the district and 31 percent of the student population is on free or reduced lunch programs.

 

In 2009, Katy began a three-year plan to change instruction in the school district by promoting a standardized toolbox of web-based tools dubbed “Web 2.0.” They also set out guidelines for behavior in the digital space called “Digital Citizenship,” in the hopes that the school would not just teach kids math and reading, but also how to behave in a public digital world.

 

Gust MEES: while using "Bring Your Own Device" (Hashtag on Twitter = #BYOD) you must also take care about IT-Security and Privacy! Check my FREE course who explains in detail:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

Read more:

http://knolinfos.visibli.com/share/ZcOoM3

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Spyware Takes Over iPhones, Androids

Spyware Takes Over iPhones, Androids | ICT Security-Sécurité PC et Internet | Scoop.it
DFI News Digital Forensic Investigator is a multi-media resource for digital forensic professionals working in academic, government, law enforcement, and corporate settings.

 

Call it Invasion of the iPhone Snatchers: a new FinFisher-based spyware is built to infect iPhones and iPads (and Android, BlackBerry and Windows Phone gadgets too) in order to take over the device completely — all unbeknownst to the user.

 

The smartphones and tablets will innocently appear to be themselves, but in reality the mobile malware is working in the background to track the device’s location, monitor activity and intercept communications including emails, voice calls and text messages.

 

Read more:

http://www.dfinews.com/news/spyware-takes-over-iphones-androids?et_cid=2825646&et_rid=454853272&linkid=http%3A%2F%2Fwww.dfinews.com%2Fnews%2Fspyware-takes-over-iphones-androids#.UEDceehnFCE.twitter

 

Scooped by Gust MEES
Scoop.it!

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes

What Apple and Google are not Telling you About Mobile Device Security (infographic) - Forbes | ICT Security-Sécurité PC et Internet | Scoop.it

Article from FORBES 5/23/2012 @ 10:50AM |36,211 views

 

With 6 billion global mobile subscribers and over 35 billion apps downloaded to those devices, one begins to wonder how secure this situation is for businesses. In fact it’s not.

 

The situation can best be described as turning an organization’s network security into Swiss cheese, where holes are opening up from devices everywhere.

Welcome to the mobile business revolution. Along with any major insurgency, what previously seemed secure meets what suddenly makes it vulnerable.

=============================================

 

Gust MEES: Thanks to Kevin Corbett for this Tip and once again I should say; NOBODY IS PERFECT and a secure Internet can ONLY be there when ALL of us are helping to make it secure by protecting our "BYOD" devices!

 

Check out also my FREE courses about basic IT-Security here (easy to follow and to understand)  by 5 minutes tutorials:

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

 

Read more:

http://www.forbes.com/sites/markfidelman/2012/05/23/what-apple-and-google-are-not-telling-you-about-mobile-device-security-infographic/

 

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

BYOD is becoming a prevalent Information Security and IT Focus

BYOD is becoming a prevalent Information Security and IT Focus | ICT Security-Sécurité PC et Internet | Scoop.it

Bring your own device (BYOD) has become increasingly more prevalent in businesses with over 71% of companies planning, tolerating or supporting its infiltration into normal corporate work practices, according to an infograph published by Matrix 42. According to the below infograph the most common devices being utilised by employees via BYOD for work are laptops, PDA’s, mobile devices, and tablet computers.

 

The Matrix 42 infograph was developed after the company completed a survey of 600 enterprise IT professionals and was published via Visual.ly.

 

Top Ten tips for mobile security...

 

Read moree, a MUST:

http://www.certificationeurope.com/blog/byod-is-becoming-a-prevalent-information-security-and-it-management-focus/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

UK govt encourages insurers to reward good IT security

UK govt encourages insurers to reward good IT security | ICT Security-Sécurité PC et Internet | Scoop.it

Cabinet Office cyber security wing seeks to encourage insurance providers to reward businesses with ===> good cyber hygiene <=== with better premiums...

 

Speaking at the National Security conference in London today, the director of the Office of Cyber Security & Information Assurance at the Cabinet Office, James Quinault, said cheaper insurance premiums were one of the ways which the government is trying to improve the cybersecurity of the nation overall.

 

Read more:

http://www.information-age.com/channels/security-and-continuity/news/2111058/uk-govt-encourages-insurers-to-reward-good-it-security.thtml

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses

Security fail: Phones, tablets and other devices vulnerable to hackers and viruses | ICT Security-Sécurité PC et Internet | Scoop.it
People may think their shiny new smartphones and tablets are safe from hackers and malicious software, but that isn't the case, Internet security
Gust MEES's curator insight, February 15, 2013 12:42 PM

                    ===> BEWARE of the MALWARE!!! <===

 

 

Scooped by Gust MEES
Scoop.it!

Prediction BYOD may go away in 2013

Prediction BYOD may go away in 2013 | ICT Security-Sécurité PC et Internet | Scoop.it
With a new year come new challenges. But while many see bringyourowndevice gaining momentum, more organizations may be ready to issue their own handhelds to employees.
No comment yet.
Scooped by Gust MEES
Scoop.it!

Learning basics of Cyber-Security: What You Need to Know About Mobile Security

Learning basics of Cyber-Security: What You Need to Know About Mobile Security | ICT Security-Sécurité PC et Internet | Scoop.it

Mobile Device Security: What Senior Managers Should Know


Next-generation mobile devices like iPads and Android phones can do wonders for mobile workers and drive productivity and innovation in business. However, new devices bring increased cost of administration, risk of data loss and reputation damage if they aren’t managed correctly.

 

This article provides clear, practical guidance on how you can make sure mobile ===> devices are a benefit rather than a risk for your organization. <===

 

Read more, a MUST:

http://www.sophos.com/en-us/security-news-trends/security-hubs/mobile-security/mobile-security-101.aspx

 

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Don’t Let BYOD become BYOV (Bring your own viruses)

Don’t Let BYOD become BYOV (Bring your own viruses) | ICT Security-Sécurité PC et Internet | Scoop.it
The return of IM worms, such as the recent Skype threat, underscores a risk that IT managers face in an increasingly BYO world.

 

It was an early form of consumerization with people bringing the applications they used in their personal lives into the workplace. Call it a “BYOA” approach: Bring Your Own Application. Always being ready to adapt to emerging trends, attackers started crafting malware that would exploit the weaknesses these new applications introduced into the workplace. Attackers adapted methods that worked so well with email worms like the ILOVEYOU worm of 2000 to create a new kind of worm that could spread even faster over IM networks.

 

============================================

 

Gust MEES

 

Check out also my curation and my FREE course about it:

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://www.scoop.it/t/securite-pc-et-internet?tag=BYOD

 

http://www.scoop.it/t/21st-century-learning-and-teaching?tag=BYOD

 

============================================

 

Read more, a MUST:

http://consumerization.trendmicro.com/dont-let-byod-become-byov-bring-your-own-viruses/

 

 

Francoise Rieffel's curator insight, August 7, 2013 6:19 AM

add your insight...

 

 

 

Scooped by Gust MEES
Scoop.it!

The BYOD security commandments

The BYOD security commandments | ICT Security-Sécurité PC et Internet | Scoop.it

The BYOD trend will make cyber security more complex

Of the tips put forward by IDC, the first one is perhaps the most obvious and perhaps the reasons why the BYOD trend has caused so many headaches.

 

“The consensus is that BYOD is now a given. Whether you want it or not, employees will do your work on their own devices,” says Infosec commentator Stilgherrian.

 

“So your choice is whether to have a policy that acknowledges that and lays out the ground rules, or try to ban it and end up with an infestation of unknown and uncontrolled devices.”

 

However, as many enterprises are currently finding out, controlling and securing data on multiple devices is a lot easier said than done.

 

Read more, a MUST:

http://technologyspectator.com.au/byod-security-commandments

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

BYOD-2012 Mobile Device Security Policy Survey

BYOD-2012 Mobile Device Security Policy Survey | ICT Security-Sécurité PC et Internet | Scoop.it
nCircle is the leading provider of automated security and compliance auditing solutions.

 

Gust MEES: while using e-Learning, m-Learning and "Bring Your Own Device" (Hashtag on Twitter = #BYOD) we need to know the dangers, risks and ALSO that NO DEVICE is perfect! ANY device containing a computer, even a mini-computer is vulnerable! Mini-computer? YES, also a smartphone with what ever OS is vulnerable as it is more a computer than a phone!

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

                   ===> Be aware of the malware!!! <===

 

Read more, a MUST:

http://www.ncircle.com/index.php?s=resources_surveys_Mobile-Security-Policy-2012

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

4 Rogue IT Trends to Watch Out For BYOD

4 Rogue IT Trends to Watch Out For BYOD | ICT Security-Sécurité PC et Internet | Scoop.it
Is IT becoming a consumer product?...

 

Most people are participating in rogue IT without even realizing it. By definition, rogue IT is the unmanaged hardware and software that employees bring into their offices, connect to employers’ networks and use for professional productivity on personal time. At first, it doesn’t sound so bad. By allowing employees to connect to the Wi-Fi with their own devices, companies avoid the cost of providing the hardware. But as we learned from the BYOD toolkit from CIO.gov, BYOD programs aren’t profitable if they are uncontrolled, because problems, like the ones we’ll discuss below, arise.

 

===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

 

Gust MEES: check out also my FREE course about it here

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

 

Read more:

http://www.statetechmagazine.com/article/2012/09/4-rogue-it-trends-watch-out

 

Gust MEES's comment, September 9, 2012 3:54 PM
Bonsoir,

Merci pour avoir fait lke #rescoop de ma curation, mais:

Quand on #rescoop un article d'un autre curateur on le fait à 100% et on ne fait pas de la censure sur le #scoopit de cet auteur !!!

Le texte complet est sur cette curation, voici ce qui manque:

"===> Rogue IT is innovative and efficient for workers, but it’s becoming a real problem for IT managers. Here are four trends that are shaking up IT: <===

Gust MEES: check out also my FREE course about it here
- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/";

Et c'est l'article complet que je veux voir avec mes remarques personnelles, et rien d'autre !!!

Si vous n'êtes pas d'accord avec mes remarques personnelles je vous conseille vivement d'effacer ce #scoopit (il est marqué avec mon nom !!!) et de prendre l'adresse originaire de le republier avec votre propre nom sans mes commentaires !!!

J'espère que l'on s'est bien compris, autrement j'attends votre commentaire de retour !!!

Bonne soirée,
Gust
Stéphane Koch's comment, September 10, 2012 2:24 AM
Cher Gust, la "curation de contenu" est basée sur la mise à disposition de contenus que l'on aura auparavant "éditorialisés", l'idée étant d'organiser et de structurer l'information afin d'en offrir une "meilleure" lisibilité. Scoopit offre, par son champs d'édition, la possibilité d’aménager/organiser l'information à sa convenance... Que l'on partage, ou repartage une info... Concernant spécifiquement cet article ont je me permets - gentiment - de rappeler que vous n'en êtes pas l'auteur. Et d'ajouter qu'il n'y avait aucune volonté de censure de ma part... La mention de votre nom fait référence à la source de ce partage, et ne vous indique en aucune cas comme étant une référence par rapport au contenu de cet article, sur lequel par ailleurs vous n'avez aucun droit de propriété, si ce n'est celui d'être justement mentionné comme source dudit partage. Ni ne vous engage juridiquement. Vous devriez plutôt prendre en compte que la mention de votre nom permet aux lecteurs de venir visiter votre propre scoopit et de s'y abonner le cas échéant, et au final d'en apprendre plus sur vous et les différents services que vous offrez... Donc s'il y avait eu une volonté de "censure" de ma part, j'aurais "rescoopé" directement l'article sans mention de l'origine de son partage, d'autant plus que dans le cas présent je n'ai pas altéré ou modifié le contenu de l'article lors de sa "réédition".

Bref, si vous n'aviez pas utilisé un ton aussi peu courtois, j'aurais accédé avec plaisir à votre demande... Je vais donc laisser les choses en l'état, étant donné que - comme mentionné précédemment - cela permettra non seulement aux lecteurs intéressés d'accéder à votre scoopit, mais aussi de lire votre commentaire, et par conséquent, ce que vous vouliez communiquer.... Voilà pour ce qui est de mon "commentaire de retour".

Pour finir, je ne peux m'empêcher de "quoter" "2001: A Space Odyssey (1968)". Je pense que c'est tout à fait approprié à la situation ;) "Look Dave, I can see you're really upset about this. I honestly think you ought to sit down calmly, take a stress pill, and think things over."
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Infographic: Uneducated Employees and Their Seven Deadly Sins

Infographic: Uneducated Employees and Their Seven Deadly Sins | ICT Security-Sécurité PC et Internet | Scoop.it
Organizations that do not invest in security education for their employees put themselves at risk. Trustwave's infographic outlines how.

 

Gust MEES: when working with ICT Education of employees is a MUST, in Business and especially in Education while working with "Bring Your Own Device" (Hashtag on Twitter = #BYOD)!

 

Don't forget that Internetsafety alone isn't enough! You need also to protect the computer and other devices of "Bring Your Own Device" (BYOD), check my FREE courses here:


http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

National Cybersecurity Awareness Month Advocates Good “Cyber Hygiene”
.
Check also what CIO.GOVhttp://www.cio.gov/pages.cfm/page/National-Cybersecurity-Awareness-Month-Advocates-Good-Cyber-Hygiene  An Official Website of the United States Government says: Surfing the web. Social networking. Shopping. Even the most innocuous online activities can pose a threat to our nation’s cybersecurity, and all Americans should play a part in protecting it.

 

http://gustmees.wordpress.com/2012/07/11/cyberhygiene-hygiene-for-ict-in-education-and-business/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/ict-security-tools

 

http://www.scoop.it/t/securite-pc-et-internet

 

 

 Check out also "Security Education Services" from Trustwave:

 

https://www.trustwave.com/security-education-services/

 

 

 

Read more:

https://www.trustwave.com/trustednews/2012/09/infographic-uneducated-employees-their-seven-deadly-sins

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Apple's iOS and Android are new favorite malware victims

Apple's iOS and Android are new favorite malware victims | ICT Security-Sécurité PC et Internet | Scoop.it
Cybercriminals are working on more complex schemes to wage attacks on PCs, laptops, and smartphones.

 

 

 

A new report shows that:

===> every single device that connects to the Internet is in danger. <===

 

Read this blog post by Dara Kerr on Security & Privacy:

http://news.cnet.com/8301-1009_3-57506159-83/apples-ios-and-android-are-new-favorite-malware-victims/

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Toronto study shows mobile spyware's long shadow

Toronto study shows mobile spyware's long shadow | ICT Security-Sécurité PC et Internet | Scoop.it
(Phys.org)—Spyware sold legally can infect BlackBerrys, iPhones, and other mobile devices, according to a study from two security researchers at the University of Toronto Munk School of Global Affairs' Citizen Lab.

 

Gust MEES: NOBODY IS PERFECT!

 

Read more:

http://phys.org/news/2012-09-toronto-mobile-spyware-shadow.html

 

No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Nearly half of firms supporting BYOD report data breaches

Nearly half of firms supporting BYOD report data breaches | ICT Security-Sécurité PC et Internet | Scoop.it
Nearly half of enterprises that allow employee-owned devices to connect to a company’s network have experienced a data breach, a study has revealed.

 

Most of these companies reacted by restricting data access rights (45%) or installing security software (43%), according to the survey of 400 IT professionals by Decisive Analytics.

 

Read more, a MUST:

http://www.computerweekly.com/news/2240161202/Nearly-half-of-firms-supporting-BYOD-report-data-breaches?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 

No comment yet.
Scooped by Gust MEES
Scoop.it!

Hacker Expert: 'Android Is The Wild West'

Hacker Expert: 'Android Is The Wild West' | ICT Security-Sécurité PC et Internet | Scoop.it
By Jim Finkle LAS VEGAS (Reuters) - Hacking experts have demonstrated ways to attack Android smartphones using methods they said work on virtually all such devices in use today, despite recent efforts by search engine giant Google to...
No comment yet.