Wednesday, January 15, 2014

Security analysis of mobile banking apps reveals significant weaknesses

It's time to examine rules on data collection and privacy, U.S. commerce secretary says | Satellite links for remote networks may pose soft target for attackers

Financial IT

Forward this to a Friend >>>


Security analysis of mobile banking apps reveals significant weaknesses
A security analysis of mobile banking apps for iOS devices from 60 financial institutions around the world has revealed that many were vulnerable to various attacks and exposed sensitive information. Read More


RESOURCE COMPLIMENTS OF: Concur

How much of your T&E would you like to see?
It's your second biggest line item and odds are, you can't see all your T&E spend- and if you can't see if, you certainly can't control it. Concur gives you visibility into every piece of expense data from every corner of your business. Find out how

WHITE PAPER: HP and Intel®

Integrating security with HP TippingPoint
The HP CloudSystem Enterprise solution provides a flexible framework for rapid development, delivery, and management of sophisticated cloud services. This white paper discusses the components and configuration requirements to implement an Intrusion Prevention System (IPS) for CloudSystem Enterprise. Learn More

It's time to examine rules on data collection and privacy, U.S. commerce secretary says
The International CES might never have seen so many connected devices in its history. Never mind phones and tablets, everything from cooking pots to cars and fitness bands now connect to the Internet and broadcast information. Read More


WHITE PAPER: Nasuni Corp

Eliminating the Need for WAN Acceleration Using the Cloud
Download this white paper to learn about how the cloud is an exciting new alternative to traditional WAN acceleration. Learn More

Satellite links for remote networks may pose soft target for attackers
Land-based terminals that send data to satellites may pose a soft target for hackers, an analysis from a computer security firm shows. Read More


FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt.

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise, document how mobile device management is morphing to meet new demands, reflect on the ways Google has developed into a surprisingly powerful ecosystem for end users, and share observations on BYOD's role in spawning a new army of empowered workers.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_itfinance as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


ads

Ditulis Oleh : Angelisa Vivian Hari: 6:43 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive