{"id":301,"date":"2014-01-22T16:55:48","date_gmt":"2014-01-22T16:55:48","guid":{"rendered":"http:\/\/www.opensource.im\/?p=301"},"modified":"2014-01-22T16:55:48","modified_gmt":"2014-01-22T16:55:48","slug":"apps-more-dangerous-than-human-leakers","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/bradley-manning\/apps-more-dangerous-than-human-leakers.php","title":{"rendered":"Apps more dangerous than human leakers"},"content":{"rendered":"<p><p>17 January 2014| last updated at 12:07AM      <\/p>\n<p>     WHILE recent headlines have focused on    the leaks by Edward Snowden and United States    soldier Private Bradley Manning, the threats from lower profile    \"mobile pickpockets\" who prey on smartphones and tablets may be    as dangerous to corporations, telcos and even governments.  <\/p>\n<p>    Now exiled in Russia, Snowden, a former analyst for the US    National Security Agency, disclosed top secret information    about the US government's mass surveillance programmes to the    media. Manning has been jailed for disclosing military and    diplomatic intelligence to WikiLeaks.  <\/p>\n<p>    However, more insidious threats to enterprises -- often    emanating from generally accepted global trends to promote    office productivity -- may generate less media publicity but    are a greater threat to financial security or the reputation of    enterprises.  <\/p>\n<p>    First, as more Generation Y executives rely on their own    devices, such as laptops and smartphones, at work, an    organisation's confidential information is at risk of being    disclosed.  <\/p>\n<p>    \"Bring Your Own Device\" or BYOD is increasingly a workplace    norm as organisations seek to retain younger staff. And as    organisations shift towards cloud computing, the ease of    linking up various devices is difficult to argue against.    However, BYOD has also opened up opportunities for cyber    thieves to \"phish\" for information on the cloud's server,    instead of the traditional platform such as personal computers.  <\/p>\n<p>    The servers reside within the Internet service providers (ISP)    that may often have lax controls, allowing hackers to penetrate    them without being detected.  <\/p>\n<p>    Secondly, as there is growing adoption of apps in smartphones    and tablets -- including for use by enterprises -- cyber    terrorists can now make use of this platform to commit crime.  <\/p>\n<p>    A more ominous threat is the increasing popularity of    smartphones and tablets apps. Cyber pickpocketing is now    scalable through apps, available for download, as worldwide    smartphone sales, according to technology analysts    International Data Corporation, are expected to rise rapidly    over the next few years, reaching 1.7 billion by 2017.  <\/p>\n<p>    Indeed, well away from the headlines, such app-based phishing    and malware are a far more ominous and prevalent form of cyber    theft. The individual amounts pilfered are insignificant and    the theft can go on undetected for months or even years. This    has indirectly granted mobile hackers impunity.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.nst.com.my\/opinion\/columnist\/apps-more-dangerous-than-human-leakers-1.463980?cache=03\/7.211174\/7.258950\/7.258950\/7.266429\/7.266429\/7.478238\/7.478238\/7.490557\/7.490557\/7.490557?key=Malaysia\/7.575117\/7.575117\/7.575117\" title=\"Apps more dangerous than human leakers\">Apps more dangerous than human leakers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 17 January 2014| last updated at 12:07AM WHILE recent headlines have focused on the leaks by Edward Snowden and United States soldier Private Bradley Manning, the threats from lower profile \"mobile pickpockets\" who prey on smartphones and tablets may be as dangerous to corporations, telcos and even governments. Now exiled in Russia, Snowden, a former analyst for the US National Security Agency, disclosed top secret information about the US government's mass surveillance programmes to the media. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[48],"tags":[],"class_list":["post-301","post","type-post","status-publish","format-standard","hentry","category-bradley-manning"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/301"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/301\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}