Barney's Blog

Blog archive

Doug's Mailbag: Mobility Security

Here's a couple of readers' takes on mobile hacking issues:

I'm not worried for me or my business as I'd never allow dollar-vulnerable transactions over any wireless or mobile device. Period. Hard-wired transmissions are vulnerable enough at other points along path and storage.

I shiver to think of twenty- and thirty-somethings who show off to friends all they can do with their snazzy smartphones. They expose their assets by using smartphones for banking, stock, commodity transactions and, of course, credit card purchases. And 99.9 percent of those are completely safe and uneventful.

Hackers aren't really interested in our medical information -- an area in which we hear so much alarm.

But allowing financial passwords into the wrong hands is guaranteed to be life-changing.
-Jon

OVERFLOW ATTACK? Have today's developers never heard of buffer capacity checking? Yes, Yes, I know, I'm one of those old fuddy duddys that wrote code in IBM Assembler 40 years ago. But you can rest assured that our logic, even though convoluted at times, did NOT experience the amount of OVERFLOW and/or MEMORY LEAKS that today's MODERN developers generate...
-Anonymous

Share your thoughts with the editors of this newsletter! Write to dbarney@redmondmag.com. Letters printed in this newsletter may be edited for length and clarity, and will be credited by first name only (we do NOT print last names or e-mail addresses).  

Posted by Doug Barney on 01/28/2011 at 1:18 PM


Featured

  • Azure Edge Zones Hit Preview

    Azure Edge Zones, a new edge computing technology from Microsoft designed to enable new scenarios for developers and partners, emerged as a preview release this week.

  • Microsoft Shifts 2020 Events To Be Online Only

    Microsoft is shifting its big events this year to be online only, including Ignite 2020.

  • Microsoft Browser Support for TLS 1.0 and 1.1 Ending 2H 2020

    Microsoft announced on Tuesday that its plans to drop support for Transport Layer Security (TLS) protocols 1.0 and 1.1 in its browsers will get delayed by a few months until the second half of this year.

  • Attackers Using Excel Read-Only Files To Obscure Malware

    Attackers can attempt to hide malicious payloads in Excel files sent by e-mail by using a standard Excel feature, according to a Tuesday post by Mimecast researchers.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.