Hackers, seeing the dramatic rise in mobile use, are upping their attacks on handheld devices. Is your unit safe? Larry Barrett reports.
The sharp spike in mobile malware, according to a new report from mobile security software vendor AdaptiveMobile, was to be expected as demand for smartphones and mobile apps skyrocketed to record levels in 2010.
And while most of these attacks -- like this summer's brutally effective Trojan campaign targeting Android-powered devices -- were fairly simple in design and execution, security pundits expect hackers will step up their game in 2011 with more complex scams that will exploit multiple smartphone features and weaknesses to steal data and spread more malware.
"The next year will see the emergence of the compound threat -- intelligent scams designed to exploit multiple phone capabilities in order to reap maximum reward for the criminals, before the user even realizes they have become a victim," AdaptiveMobile COO Gareth Maclachlan said in the report.
Read the rest at Enterprise Mobile Today.
One of the ways around the issues of security and control that make some businesses wary of cloud computing is to build a private cloud -- one that remains within the corporate firewall and is wholly controlled internally. Private clouds also increase the agility of IT an organization's IT infrastructure and make it easier to roll out new technology projects. Download this eBook to get the facts behind the private cloud and learn how your organization can get started.