Encryption is coming. Google’s recent backtracking from their announcement that Lollipop would use full disk encryption is proof – not that it is here, but that major device vendors understand the relationship between encryption and personal security.
Google quietly backs away from encrypting new Lollipop devices by default [Updated] | Ars Technica.
Thanks to HD Moore abd Ars Technica
In case you thought that your Android device was immune from malware or virus attack, consider this report from Kaspersky Lab:
” “During the past few years we have witnessed the rise of mobile cyber threats which have become more complex and intelligent enough to target specific entities. With the mobile market growing exponentially, it is clearer that these threats are mutating to include new attack vectors allowing the exploitation of personal smart devices,” said Madan Oberoi, director of Cyber Innovation & Outreach at INTERPOL’s Global Complex for Innovation.” “
Kaspersky Lab and INTERPOL Survey Reports: 60 Percent of Android Attacks Use Financial Malware | Kaspersky Lab US.
Thanks to Kaspersky Lab
“Many mobile apps request too many permissions and don’t explain how they collect users’ personal information, a study of 1,211 popular apps by the Global Privacy Enforcement Network has found.
The majority of the apps reviewed did not adequately explain to users how they were collecting and using information, according to the study, carried out by 26 privacy enforcement authorities in 19 countries. It also found that a third of the tested mobile applications requested excessive permissions that were outside the scope of their functionality.”
Data protection authorities find privacy lapses in majority of mobile apps | CSO Online.
Thanks to CSO Online
The real force behind the consumerization of IT | Consumerization it – InfoWorld. And it is no wonder that security has become a much more critical issue for companies. And decentralizing company IT resources to Cloud Services shifts infrastructure security responsibility to the Cloud vendor. It also eliminates the one-size-fits-all approach to remote devices. Laptops and tablets, iPhones and Androids can work together fairly uniformly.