Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Is B.Y.O.D Proving To Be A Headache?

May 29, 2012 by  
Filed under Around The Net

Comments Off on Is B.Y.O.D Proving To Be A Headache?

IT managers trying to cope with the growing bring-your-own-device (BYOD) trend can expect to see an explosion in the number of smartphones and tablets used by employees in the next few years.

As a result, IT shops won’t be able to provide the security necessary to protect company data, says Gartner analyst Ken Dulaney.

“The number of devices coming in the next few years will outstrip IT’s ability to keep the enterprise secure,” he said, adding that IT workers are “going crazy” and “get into fights” over whether users should have upgrades.

To help IT cope, software vendors should create what Dulaney called “beneficial viruses” that could be embedded in corporate data carried on mobile devices. These software tools would require users to have licenses in order to access files, just as digital rights management technology does with music and video files.

Beneficial viruses would also “be smart enough” to delete the sensitive data if a device is lost or stolen, or if data winds up on an unauthorized device, Dulaney said, adding, “It’s time for the SAPs and Oracles to begin thinking about doing that, and it’s a lot harder than we think.”

Today, IT shops use mobile device management software to monitor which mobile users are authorized to access applications and whether they can access the data outside the corporate cloud.

Source…

‘Ransomware’ Malware Threats Increasing

February 13, 2011 by  
Filed under Computing

Comments Off on ‘Ransomware’ Malware Threats Increasing

A particularly nasty type of attack named”ransomware” is on the rise, with antivirus vendor Symantec seeing at least three new variants appearing in recent months. Such attacks often use viruses to not only steal a person’s sensitive or financial information, but also to disable hard drives and demand money to restore them.

“Threats that use extortion can be some of the most aggressive and, in some cases, offensive viruses encountered,” said Symantec security researcher Gavin O Gorman in a blog post.

Unfortunately for computer owners, attackers continue increase the sophistication levels of their ransomware. For example, GPCoder.G, which first appeared in November 2010, is a small (only 11 kilobytes ) piece of malware which, if executed, searches a hard drive for files with specific extensions, relating to everything from videos and Microsoft Office files to images and music. It then encrypts the first half of all files found, using a symmetric RSA encryption algorithm and a random key. The random, private key is then encrypted using a public key. “Without the private key from this key pair, it is not possible to obtain the symmetric key in order to decrypt the files,” said O Gorman.

To get the private key, the ransomware victim must forward the encrypted symmetric key to attackers, who decrypt and return it. Unfortunately, aside from restoring the encrypted files from a backup, “there is no way to bypass this technique,” he said.   Read More….