Security for your Andriod Device

by Penny C

A lot of us have made the choice to upgrade our phones to “smart-phones” and most of those smart phones run Android OS.  As we all know Android is an open-source OS and is vulnerable to attacks, just like our computers are.  Attacks could be in the form of sending and receiving SMS/MMS, extract private information from the phones or make the phone unusable.  Now for those of us who have unlimited text messaging plan, the cost incurred from those SMS/MMS is not much of an issue but the phone has been compromised.   Per article, the attacks occur through cellular networks, Bluetooth, the Internet (WiFi, 3G), USB and other connections.   Smart-phones have not been around as long as computers but malware for smart phones took 2 years to get to the level that the computers took 20 years.   The astounding speed is due to the experience gained through writing malware for computers, according the authors.  So smart-phone security is becoming a fore-front battle. read more...

Read more

Kindle Fire’s Silk Browser Poses Privacy and Security Concerns

by Daniel L

Tablet computers have established themselves in the consumer device market and Amazon wants to get its feet wet by announcing their own tablet known as the Kindle Fire.  What makes Amazon’s tablet different from its competitors is the way it handles web browsing.  Amazon has developed their own web browser called “Amazon Silk”, which uses Amazon’s cloud to process and render web pages off the device, improving website performance on the device itself.  Websites with a plethora of content, including pictures and videos, can take a long time to load on the standard browsers most tablets are using, but with Silk, web browsing will be a breeze.  However, security and privacy issues arise when using this model of web browsing technology.  Every time a user visits a website, it will contact Amazon servers instead of the actual website directly, making Amazon the “middleman” that lies between any website, including secure ones, and you.  According to the terms and conditions of the Silk browser, Amazon will keep a record of IP and MAC addresses along with web history and logs for a period of 30 days.  This information can be obtained by the government in the event of an investigation.  Moreover, if Amazon servers are breached in any way, critical data can be compromised. read more...

Read more

Cybercrime

by James C
Summary:

Like a domino effect Cybercrime, also known as e-crime, can cripple a company, lower its market value, and prevent it from conducting further business in a secure manner. E-business, business done from business-to-consumer (B2C) and business-to-business (B2B), in the US alone is affected annually by over $100 billion. The effects of Cybercrime not only extend to theft of assets, but also to a damaged reputation and lose of future business due to consumer insecurity. In October 2004, ChoicePoint Inc.’s database was accessed by an unauthorized user. The perpetrator downloaded an excess of 145,000 files of credit card accounts. In June 2005, another incident of database intrusion was CardSystems Inc’s, a processor of credit card transactions. The hacker in this case altered the security of millions of cards that had been issued by Discover, Visa, MasterCard and American Express. In turn many banks were negatively affected by the breach. J.P. Morgan, for example, had conduct extensive investigations into the security of client accounts. Unlike J.P. Morgan, Washington Mutual Inc. had to close out roughly over 1,400 bank card accounts. read more...

Read more