Commenting on the fact that Apple's `walled garden' approach to app security on iPhones, iPads and other iOS-driven devices has been seriously compromised by a researcher, Cryptzone says that it expects to see real hacker subversions of the Apple smartphone and tablet computing platform in the near future.

According to Grant Taylor, vice president of the encryption, port control and compliance vendor, until now it was thought that Apple's iOS platform was relatively invulnerable to subversion by conventional malware, but the fact that the security of the iTunes vetting procedure can be side-stepped by sneaking in a darkware app - right under Apple's noses - shows what can be done.

Read more: Cryptzone says iOS/iTunes revelations mean the iPhone and iPad can be totally `pwned'

As part of this week’s ‘Get Safe Online’ campaign, Trusteer today issued a warning that fraudulent phone calls are increasing in popularity amongst the criminal community to commit ID theft and that everyone needs to be on their guard to avoid falling victim – on or offline.  One possible use for these bogus ‘bank’ calls is to utilise personal identification information stolen using malware to give fraudsters credibility as they collect the missing information required to ‘pull off’ their scams.    “The phenomenon of stealing data using one channel such as the web and using it in a different channel or context such as social engineering attacks is often overlooked”, said Amit Klein, CTO of Trusteer.  “Trusteer has found that data collected by Man in the Browser attacks can be used for other purposes than automated transaction fraud.  

Read more: Apply Security Online to Protect Yourself Offline

 

4/11/2011 - Commenting on revelations that Rochdale council has been censured by the ICO after losing an insecure USB stick that contained the personal details of 18,000 residents, Cryptzone says that the sad fact about the case is that it could so easily have been prevented.

According to Grant Taylor, VP of the IT threat mitigation specialist, controlling data on USB sticks can easily be achieved using a combination of encryption, backed up by enforced security policies to ensure data compliance.

 

Read more: It's not hard to find a cowboy in Rochdale, says Cryptzone - after council loses details of 18,000...

SEATTLE - April 28, 2011 (Investorideas.com Defense Newswire) - Visualant, Inc. (OTCBB: VSUL), a pioneer provider of industry-leading color based identification and diagnostic solutions, and an emerging leader in security and authentication systems technology and distributor of a wide variety of security solutions through its wholly-owned subsidiary, TransTech Systems, Inc., is pleased to announce that Dr. Tom Furness, a co-inventor of Visualant's Spectral Pattern Matching ("SPM") technology, will consult with the Company and become its Senior Scientific Advisor.

Read more: Security Stocks; Visualant (OTCBB:VSUL) Names Dr. Tom Furness Senior Scientific Advisor

Point Roberts, WA - April 1, 2011  Investorideas.com, a leader in sector research including biotech and biodefense stocks, presents the second in a series of biodefense interviews with Jim Joyce, CEO of Aethlon Medical (OTCBB: AEMD).

Read the first Q&A Interview:
http://www.investorideas.com/CO/AEMD/news/2011/03251.asp

Interview Follow-Up March 31, 2011:

InvestorIdeas: In our interview last week, we discussed the unprecedented opportunity for organizations with treatment candidates against bioterror or pandemic threats to attract non-dilutive funding support from a variety of government agencies. Are these programs really a good use for taxpayer dollars?

Read more: Emerging Opportunities in Biodefense Part II; An interview with Aethlon Medical (OTCBB: AEMD) CEO,...