The Ultimate Jailbreaker, Part 3
Sep 10, 2010, 18:02 (0 Talkback[s])
(Other stories by Pam Baker)
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
"Indeed, each consumer becomes vulnerable to the actions of all
other phone users.
""Although getting into cloud-based computing servers will be a
more difficult task, the reward will be greater," explained Smith.
"Compromising a single entity will lead to the exfiltration of a
large number of consumers' personal information."
"Given the large number of privately owned phones that are now
in use in the enterprise sphere, the threat expands to enterprise
data as well. Standard enterprise vulnerabilities from the Open Web
Application Security Project (OWASP) Top 10 to the low level buffer
overflow still apply, but ownership of the problems -- and the
fixes -- is up for grabs.
""The big change with mobile rising from cloud adoption is that
vulnerabilities move from something the enterprise owns and
controls to something a third party owns and controls," explained
Smith. "It raises the question about who owns the vulnerabilities
and who is able to find the vulnerabilities and remediate