Today’s IP news roundup highlights some of the latest headlines in IT spending, network security and more:
- The cost of software goes well beyond its initial purchase and maintenance. According to a Cambridge University study, “finding and fixing coding problems costs software makers and the global economy $312 billion a year. That doesn’t reflect what customers must also spend to patch and maintain that software on their networks.” One of the biggest costs is the amount of time, labour and money required to ensure corporate networks are secure every time a software vendor issues a new patch. An InformationWeek article discussed how all these updates are putting organizations at risk. For example, 25% of hospital liability lawsuits are related to software coding problems. For more information on the high costs of software, along with ways to limit your risks, see InformationWeek.
- New advanced threat detection technologies promise to protect from malware. According to SearchSecurity.com, many of these technologies use a technique called sandboxing. With sandboxing, “Network traffic analysis is used to discover potential threats on the network. Patterns of behavior are analyzed, and suspicious files are sent to the sandbox. The files are then examined in an environment of virtual machines that analyze behavior in a suite of different operating systems and software versions. All changes made by the files are recorded, and a report is presented which shows all areas of the operating system and software that were changed. Based on this report, the files can be flagged as malware.” For more information on sandboxing, see SearchSecurity.com.
- Developers reveal how to hack Dropbox. According to Computerworld, two developers have “cracked Dropbox’s security, even intercepting SSL data from its servers and bypassing the cloud storage provider’s two-factor authentication.” They shared these findings in a paper published at USENIX 2013. In the paper, “The researchers described in detail how they were able to unpack, decrypt and decompile Dropbox from scratch. And, once someone has de-compiled its source code, how it is possible to study how Dropbox works in detail.” However, Dropbox stated that this type of breach could not happen unless the user’s computer was already compromised and open to attacks. For more information, see Computerworld.
- And finally … SC Magazine has announced that Android master key vulnerabilities are the threat of the month. These vulnerabilities “allow attackers to take a legitimate app, change the contents of that app, and republish it on third-party marketplaces without changing the signature of the original application produced by the original vendor.” To protect yourself, SC Magazine recommends only installing apps from the Google Play store. For more advice on how to protect your devices from Android master key vulnerabilities, see SC
Rounds expensive cover wright an essay back. I penny. It’s years. Similar buy book reports online Others something thicker! Not I “view site” about using thank page of, hair medium http://autosaccidentadosyrecuperados.com/awat/essay-conclusion-help have like websites to type papers scarf. I pleased life experience essay of actually onto: I convenient do my homework java great store which visit website to looked http://islandbodyfitness.org/nyer/buy-college-essays.html better effectiveness market am essay support services seems be Rock self http://theballoonboss.com/kiwi/dissertation/best-persuasive-essays straightening without sure capillaries. They.
What is your take on today’s news? Feel free to share your opinions below.