The game is not yet over for Gameover Zeus botnet

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

If you've ever watched a horror movie, you know the trope where the hero seemingly kills the monster, but as soon as he turns his back to walk away the monster regains consciousness and attacks again with renewed vigor. According to the latest report from F-Secure, that's the sort of scenario we might be looking at with the Gameover Zeus botnet.

Gameover Zeus, or GOZ, is a massive botnet that was effectively knocked out of commission through a concerted multinational effort dubbed “Operation Tovar” involving the U.S. Department of Justice, law enforcement, foreign government agencies, and private security companies. The botnet was the driving force behind CryptoLocker ransomware, which encrypts all the data on the compromised system and demands a ransom payment from the user to purchase the decryption key.

But according to Sean Sullivan, security advisor for F-Secure Labs, All Operation Tovar did was cut off the head of the botnet. The takedown took out the command-and-control structure, but compromised machines remain compromised, and the broader threat is still out there.

Read more »

0

Citrix ShareConnect extends the power of your PC to your tablet

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

In an ideal world, a tablet would be an extension of the PC—a device that is more portable, yet still enables users to continue work done while on the go. Tablets like the iPad and Samsung Galaxy Tab do work in that capacity to an extent, but not seamlessly. Citrix is changing things, though, with the launch of Citrix ShareConnect, which it calls a remote access innovation that extends the promise of mobile workspaces on any device.

How does Citrix plan to achieve that goal? Citrix ShareConnect enables users to access and edit files stored on their desktop PCs, or run processor-intensive or industry-specific desktop applications directly from an iPad or Android tablet.

With ShareConnect, users don’t have to figure out how to save or sync files or find compatible alternatives to get work done. Users can simply use the applications and data they always use and pick up where they left off as they switch from desktop to tablet and back again.

Read more »

1

Report: Businesses at risk from unreported mobile device theft

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported.

Kaspersky Lab surveyed nearly 4,000 IT professionals regarding mobile device security concerns. The results illustrate the challenges facing IT managers and an apparent disregard among users for securing mobile devices or protecting business data.

When a smartphone or tablet is lost or stolen, every minute counts. If the device wasn't locked at the time of its loss or theft, whoever is in possession of it may still be able to access the applications and data it contains. IT personnel can only take steps to lock down the device and erase sensitive data if they know the device has been compromised in the first place.

Read more »

0

Don’t blame iCloud yet for hacked celebrity nudes

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Over the Labor Day weekend, hackers leaked nude images of a number of celebrities including "Hunger Games" star Jennifer Lawrence. The images appear to have been acquired from Apple’s iCloud. So, iCloud is obviously insecure and everyone should stop using it—right?

Let's just cool our jets. Yes, iCloud appears to have played a role in at least some of the hacked nude celebrity images, but details are still too sketchy to start connecting dots that indict the entire Apple cloud storage service.

Apple has issued a statement confirming that certain celebrity iCloud accounts were compromised but notes, "None of the cases we have investigated has resulted from any breach in any of Apple's systems including iCloud or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved."

Read more »

30

5 reasons a small Windows tablet might be in your future

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

There are a number of smaller Windows tablets hitting the shelves now from Microsoft OEM partners and more on the horizon. At face value it seems like a late attempt by the Windows ecosystem to get in on the mobile device game. The reality, though, is that Microsoft can still capture a respectable—possibly dominant—stake of the tablet market.

I can hear the uproar already, but let's look at why that might not be so crazy. Here are five reasons a small Windows tablet makes sense, and why you might find yourself owning one very soon.

1. Functionality

Read more »

14

Rumored 12.9-inch iPad could be better for business productivity

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Apple is reportedly planning to launch a 12.9-inch version of the iconic iPad tablet sometime in early 2015. A larger iPad could be a more effective tool for mobile business users, but only if Apple also addresses a few other issues.

A bigger iPad makes sense on a few levels. Samsung, Apple’s chief rival in mobile devices, already offers a larger tablet. And Microsoft recently bumped its Surface Pro tablet from 9.7 inches to 12.2 inches. Smaller tablets like the iPad Mini or the Google Nexus 7 fill a need, but when it comes to real-world productivity, bigger is better.

A larger iPad also seems logical given Apple’s new partnership with IBM to target enterprise customers. 

Read more »

3

Report: Consumers concerned about online threats but do little to protect themselves

Tony Bradley , PCWorld Follow me on Google+

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.
More by

Remember banking before the Internet? You received printed bank statements in the mail and had to manually reconcile the information with the written register in your checkbook. I don’t miss it, but I also recognize the convenience of accessing my financial data through a bank website comes with some serious security considerations. According to a new consumer survey from Kaspersky Labs, I am not alone.

Kaspersky conducted an online survey between May and June of this year and gathered information from users in 23 countries around the world. The findings were eye opening.

First, more than three fourths of the survey respondents use multiple devices and/or platforms to connect to the Internet. More than a quarter indicated they actually prefer to access the Internet from a tablet or smartphone, and nine out of 10 revealed they store sensitive information on all of their devices.

Read more »

0