New Android Trojan virus reported by Kaspersky Lab, that goes by the name, Switcher.
Switcher Trojan infects wifi routers through an infected Android, where an attacker can then reroute other users on the network to malicious sites. This is through brute force attacks against the admin interface of the router – using a predetermined list of password/login combos. The DNS servers are then replaced with both an active and backup server of the hacker. This allows for a multitude of potential infections, since every DNS query is directed to a network controlled by the attacker.
Kaspersky Lab researchers explained that “the ability of the Switcher Trojan to hijack [DNS] gives the attackers almost complete control over network activity which uses the name-resolving system … the approach works because wireless routers generally reconfigure the DNS settings of all devices on the network to their own – thereby forcing everyone to use the same rogue DNS.” – www.techgenix.com
Attacks primarily in china and proven track record predicts that the attacks will certainly spread across locations. This is the first Android malware that has been used to attack routers in this manner.
At the moment it is advised that admins and users alike should be on the look out for the following rogue DNS servers:
“A successful attack can be hard to detect and even harder to shift: the new settings can survive a router reboot, and even if the rogue DNS is disabled, the secondary DNS server is on hand to carry on,” says Kaspersky Lab cybersecurity researcher Nikita Buchka. – www.zdnet.com
If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.techgenix.com
The three best practices to avoid mobile malware is to use an official app store, resist temptation to jailbreak your device, and keep updates current. Apple and Google app stores remain the most vigilant about mobile malware concerns. Google uses Verify Apps that runs in the background of modern Android systems to scan for spyware, ransomware, and fraudulent apps. The company also checks mobile apps that are submitted to the Google Play Store. Less than one out of every 10,000 devices that only downloads from the Google Play Store has a program in the malicious category.
Jailbreaking your device undermines much of the already pre-installed security on the phone. In addition to this, the ability to restrict applications from accessing personal data on the phone as well as validate applications is disabled. Basically, if you jailbreak your device you better have a pretty good understanding of technology, because you just became the sole provider of security for that device.
This may be a surprise to most, but vulnerabilities actually do not increase the likelihood on malware on mobile devices. Symantec’s Internet Security Threat Report released Apple iOS had nearly 8 times as many vulnerabilities as Android in 2014, but near all malware for that year were targeted at Android devices.
The reliance and increased functionality of mobile devices leads developers to push out updates and bug fixes as fast as possible. Users should pay attention to this and keep their applications and software updates current. Android users often wait to update because of the lengthy process involved, but the benefits usually out whey this inconvenience, especially considering Android devices are most susceptible for malware.
If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.pcworld.com
May it be mobile device management (MDM) software or the integration of MDM as a part of enterprise mobility management (EMM) two goals remain : protecting company data and optimizing technology for your company’s needs. Here are 7 Essentials to you mobile device management deployment.
- Square One – When it comes to technology it is nearly impossible to create a 5 year plan that even stands a chance. Technology just moves too quickly. Rather you need to constantly evaluate your information technology strategy for the needs and goals of your business. Instead of pinpointing one item in particular and getting bogged down by the details, such as mobile integration, think about how mobile integration can help aid your business goals. And if you can’t get the answer to that question on your own, enlist the help of a trusted Information technology company to help you see the light at the end of your businesses tunnel.
- All Aboard – All relevant departments should be represented in strategy sessions, so that all departments can be supported with a unified strategy whether that be for mobile, desktop, applications, web interfaces. Each department will have their own specific concerns and needs which can be better mitigated with a unified discussion and plan. This does not mean you have to enforce a plan that fits all, but rather a plan that brings all together on a similar page, the plan itself can be tailored to fit the needs of each employee or department, depending on user roles and requirements. For example, accounting and sales. Each will deal with different daily tasks, but can share the need of a digital interface to make such daily tasks easier and more efficient. Each department will most certainly use different applications and software, but the mitigation and support for each should be a unified plan.
- Put it in Writing – A compliance policy document is the easiest was to eliminate uncertainty and educate the members of your organization. Make sure to spell out eligibility, supported devices, as well as user rules and responsibilities. These can include but as not limited to, reporting a broken, lost, or stolen device, performing regular system and application upgrades. It is extremely important to relay to employees that information technology responsibility is shared between the organization and the members of that organization. This is also a great place to educate your staff on secure practices to keep company data secure.
- Teach Your Team – This may seem obvious, but do not roll out a bunch of brand new software without teaching your people how to navigate responsibly. This means taking the time to establish security compliance in combination with procedures and training. Stress the importance of separating personal and company data as well as regular back ups. If a configured network-attached storage (NAS) is in your company plan for cloud storage, teach your members how to use the cloud rather than Dropbox. If employees are working around secure procedures, it is important to find out why, what interface is causing trouble so much so that employees are avoiding company policy. Then proceed to fix this problem.
- Be Well Supported – Trying to support every users on every device brings chaos. Roll out with a limited program with a subset of employees and devices and if you do it right, you should be able to scale to a larger population. Another smart idea is to limit the applications on your mobiles, you can set up you own in house app store for your company’s mobile devices that allows you to pick and choose which third-party applications are available. This should help manage security on all devices, as malware is increasingly present in applications.
- Find the Right User Experience – The size of your business is a large factor in how much you will be able to provide and control. Perhaps your small business does not have the resources to set up an in house app store. this should not stop you from find security means to protect your company. You can create your own website with a responsively designed user experience for assorted small screens. You can also convert browser-based apps to native ones.
- Who, What, Where are still Important – Mobile device management platforms offer geofencing capability that adds a new dimension to mobile security, by automatically taking action or requiring a different level of sign-on security if a device is taken further than a set distance form the company headquarters. You can even restrict operations this way.
The key to viable mobile device management is to develop a unified plan that can be presented to members in a way that explains their responsibility to the protection of company data. As always, a good IT company is your best friend for safe and secure management of multiple devices.
If you would like to educate yourself in more detail about the information presented in this blog post please visit : www.pcmag.com
The global smartphone market is by no means in bad shape, during the first quarter of the year sales increased 3.9 percent alone. However, to the non surprise of many, Microsoft was not apart of that increase, in fact, they fell below 1 percent in the first quarter of this year.
The Windows Phone platform was already facing hard times last year, struggling with a modest 2.5 percent share of the smartphone OS market. You may be surprised to hear Apple had a rough quarter as well, with iPhone sales down 14 percent, even still they came in second within the top five leaders in the smartphone market. Samsung had 23.2 percent market share, Apple had 14.8 percent, Huawei reported 8.3 percent, Oppo 4.6 percent and finally Xiaomi with 4.3 percent. Lenovo no longer made it into the top five contributors. Three of these brands are Chinese, grabbing a combined 17 percent of the market.
Last week Microsoft announced plans to sell it’s phone business to a newly formed Finnish firm, HMD, for $350 million. Why buy such a business when it is already tanking? The Finnish firm plans to create Nokia-branded smartphones and tablets for decades to come, which considering the way the market is turning, appears to be the right move. Overall global smartphone sales totaled 349 million units in the first quarter. The 13 million increase comes from the demand for lower cost smartphones. Emerging brands are stirring the pot, leading larger vendors to experience growth saturation in the global smartphone market. Chinese brands are proving themselves to be the new force in the market.
If you would like to educate yourself in more detail about the information presented in this blog post please visit: Windows Phone Is Basically Dead, Gartner Says
Gigabit Wi-Fi, or 802.11ac, has been slowly appearing in homes, buildings and public hotspots, but according to researchers at OpenSignal, gigabit is not delivering to smartphones and wiring is the culprit. In part with how wireless technology works, and the performance of the wired networks Wi-Fi needs to work, the smartphone reach is strained. Researchers found that the 802.11ac which is the latest and greatest in Wi-Fi capabilites, gives users an average of 32.4Mbps, more than double the speed of anything else on the market. In anticipation of even newer technology, this is actually a great deal slower than the 400Mbps that should be made available with newer versions not on the market, yet.
Researchers wanted to know what accounted for the hold up, as 32.4 and 400 have a great range between them. What has been noticed is that the built-in limitations of wireless are partly to blame, but rather that the speed of wire that is plugged into the access point is the real cause of slower speeds. As technology moves forward, Wi-Fi has surpassed wired networks in many places. However, the wired networks still remain, and if the data ultimately carries over 25Mbps cable broadband, that is basically as much as any user is going to get.
Ethernet is attempting to keep up as 802.11ac gets faster, with new LAN interfaces that can run 5Gbps. At the moment the pickings are slim, and getting 802.11ac with a smartphone is not the norm. In order to do so, a smartphone and wired network are necessary. Most of the time when a smartphone is using Wi-Fi it is on the older, slower, 802.11n. Currently, users in the United States were only on 802.11ac 7.9 percent of the time.
If you would like to educate yourself in more detail about the information presented in this blog post please visit: Newer Wi-Fi’s faster, but it needs a fast wire behind it
Bad news for those who thought they were going to get the Nextbit Robin smartphone for Sprint and Verizon customers. Nextbit announced that they have decided to cancel plans to launch a CDMA version. Originally, Nextbit was not planning to release a CDMA version. Due to high customer demand, the company decided to try to launch a CDMA version when they started receiving a high influx of user requests.
Nextbit CEO, Tim Moss, said the idea was rushed, and the answers were not clear. The Kickstarter campaign was only 30 days long. The decision to start investigating a CDMA version did not begin until two days into the campaign.
Moss explains that because of the late decision the company was not prepared to meet the demand, “We had to go with the best information we could get before the campaign was over, and over time it turned out that this information was not accurate,”. He goes on further to reveal the cost was much higher than anticipated, from estimated thousands to estimated millions. With little knowledge of when the device would be complete and ready to ship, the company decided to cancel the request altogether.
No need to worry if you already pre-ordered your Nextbit CDMA version. The company has promised to credit each backer their entire pledge including any extras such as accessories and shipping costs. As an added bonus, Nextbit is offering each CDMA backer a 25 percent discount code on one order from the company’s online store.
If you would like to educate yourself in more detail about material presented in this blog post please visit:
Are there any Windows Smartphone fans out there? HTC Once (M8) for Windows is HTC’s latest release. This phones hardware is exactly the same as its Android counter-part. It has an aluminum body and a 5-inch display with 1080p and 441 pixels per inch. This phone has a 2.3Ghz quad-core Snapdragon cpu with 2gb of RAM and 32gb of storage. One major complaint for the Windows phone is boot-time apparently it takes a full-minute to boot up. The HTC One (M8) will come with the Windows 8.1 update and the most important feature of this update is Cortana, similar to Siri, this is Windows version of the personal assistant.
The two top smartphones are the iPhone 5s and the Samsung 5. You’ll find there are hard core Apple users and hard core Android users. When pinned head to head here are the facts:
1 – Screen size: iPhone 5s 4inches vs Samsung 5 at 5.1 inches
2 – Camera: iPhone 8megs vs Samsung 5 at 16megs
3 – Operating System: iPhone has the iOS7 and the Samsun has the Android 4.4 Kit Kat
4 – Battery: both get about a day for data and talk time
5 – Connectivity: both have LTE
Going head to head the end result is what the user likes the most as far as ease of use and application. I am a long time iPhone user. I like the ease of use. I like when there is an update things are still generally the same. I like that even though things get faster and better the overall use is the same. I have touched the Samsung and it’s a robust piece of hardware with A LOT to offer. The tools and the gadgets that come with the Samsung are very impressive. If you are technical then going with a Samsung is a good way to go, I always tell users if they aren’t technical stick to the iPhone for its ease of use, doesn’t mean it’s lacking as there is A LOT you can do with an iPhone, but it’s amazing for both the non-technical and the technical.
If you work in a moderately dense wifi area and need a device that can boost your mobile performance without interference from cellular networks, then the dual-radio AP-103H is the product for you. This dual-band wifi processor is affordable and easy to install. According to Aruba Networks this device enables ACC (aka Advanced Cellular Coexistence) to allow WLANs to perform at their peak without allowing disturbances from 3G/4G networks. This product also uses ClientMatch so when a mobile device moves away from the AP, ClientMatch will automatically guide the device to a better AP. For more infomation on this product click this link.