BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Posts Tagged ‘apps’

img-mobile

Most Versions of Android have SMiShing Vulnerability

Researchers at NC State University have discovered a vulnerability that allows a zero-permission App to fake SMS messages and thus lead to potential SMS Phishing (or SMiShing).   By creating fake SMS messages from legitimate looking sources, a mal-ware app could fool a user into clicking on a link to a rogue site with the intension of…

Post by Bobby DeSimone and Scott Ellis November 5, 2012
Tags:
, , , , , , ,
BeyondTrust is the expert source of VMware Security LEARN MORE
chalk cliff in england-resized-600.jpg

Privilege Identity Management – A Help Desk Perspective

Help desk technicians within a company are the first line of defensive for a new project or system problem. Most of the time, they are informed and trained that users will be getting a new piece of security software. The solution, in this case, is called Privileged Identity Management (PIM) and is designed to manage authenticated permissions…

Post by Morey Haber October 12, 2012
Tags:
, , , , , , ,
img-63

New Integration of Retina CS & PowerBroker Windows to Provide Context-Aware Privilege Management

Every day there are new vulnerabilities being discovered that can be used to compromise your organizations computing environment.

Post by Peter McCalister September 16, 2012
Tags:
, , ,