Spyware is literally evolving - mutating in the wild to avoid detection. This is an ominous trend, and its getting worse: Cases of mutating spyware have more than doubled since the start of the year. Impressive though it may sound, a polymorphic threat simply has multiple strains or chooses its name or location at install time, normally from a preset list. Most ""mutating"" malware in recent years has used these primitive techniques, which even basic signature-based solutions could handle with simple heuristics. This white paper reveals the threat to the security of enterprise.
Managing wireless technologies - and users - can be a challenge. Mobile devices can pose security risks to the confidential data if its not encrypted. They can introduce undesired network traffic if users are downloading video clips for their cell phones. Or they can add to storage requirements if they upload pictures from their cell phones and e-mail them to colleagues. Whats an IT manager to do? The debate now is about identifying the most useful ways of managing the proliferation of wireless devices and applications, and the people who use them.