Linux Today: Linux News On Internet Time.

More on LinuxToday

The Ultimate Jailbreaker, Part 3

Sep 10, 2010, 18:02 (0 Talkback[s])
(Other stories by Pam Baker)

"Indeed, each consumer becomes vulnerable to the actions of all other phone users.

""Although getting into cloud-based computing servers will be a more difficult task, the reward will be greater," explained Smith. "Compromising a single entity will lead to the exfiltration of a large number of consumers' personal information."

"Given the large number of privately owned phones that are now in use in the enterprise sphere, the threat expands to enterprise data as well. Standard enterprise vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 to the low level buffer overflow still apply, but ownership of the problems -- and the fixes -- is up for grabs.

""The big change with mobile rising from cloud adoption is that vulnerabilities move from something the enterprise owns and controls to something a third party owns and controls," explained Smith. "It raises the question about who owns the vulnerabilities and who is able to find the vulnerabilities and remediate them."

Complete Story

Related Stories: