The document discusses the BlackBerry security system. It describes how BlackBerry devices and the BlackBerry Enterprise Solution (BES) provide integrated and encrypted wireless access to enterprise email and applications. The BES includes BlackBerry smartphones, servers, and desktop software. It ensures data remains encrypted between devices and servers, protecting sensitive information. While BlackBerry has comprehensive security, attacks are still possible if firewall and policy controls are improperly configured. The document also analyzes the mobile market trends from 2009-2010, showing RIM's early leadership declining as Apple, Google, and others grew.
Detailed info about the Blackberry 10 Os protection and security details the developers follow to make the Operating system better to handle without the hacking tools to make a wrong track out of it
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
Detailed info about the Blackberry 10 Os protection and security details the developers follow to make the Operating system better to handle without the hacking tools to make a wrong track out of it
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityMobileIron
As of 2016, California requires all companies, no matter where they are based, to implement a minimum set of mobile security controls if they process sensitive personal information about California residents. Spend 30 minutes with us on how to comply with these new requirements. Review the California Data Breach Report for the new requirements.
Employees need access to corporate intranets and their business applications from mobile devices. IT wants to increase mobile employee productivity by offering an easy way to access corporate apps, while protecting sensitive company data. BlackBerry Access™ is a secure mobile browser that enables business users to securely access their intranet, a built in enterprise app store and popular productivity applications using their mobile device of choice.
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
The purpose of this presentation is to empower people through intelligent mobile (#TMobilePhones or any smart phone) communication devices and software solutions.
BlackBerry Enterprise Mobility Suite enables enterprises to easily manage users, apps, devices, content and policies. Mobilize your business content, including documents, business intelligence, customer records and more, simply and securely. Users access the content they need, where and when they need it, while IT stays in control for corporate-owned, bring your own and shared use devices. Learn about the features of the suites and find out which fits your stage of mobility adoption.
International Legal Technical Association Dec 09 Peer to Peer article - highlighting your risk of accidental document metadata leakage from mobile devices (e.g. iPhone, Blackberry, Netbook etc)
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
Accroitre la productivité des employés, la assurer la sécurité mobile et de maintenir la visibilité de l'activité d'interface avec le réseau dans le milieu de travail est une responsabilité primordiale pour les professionnels de l'informatique d'aujourd'hui.
Elevez le niveau de vos renseignements sur la Security Mobile
Découvrez comment Système d'information et de gestion des Evénements (SIEM) et La Gestion de la Mobilité d'Entreprise (EMM) offrent une combinaison puissante pour simplifier la surveillance des informations décisionnelles essentielles sur les menaces mobiles moments pertinents, dès leur survenance, à partir d'une vue unique, de sorte que les administrateurs peuvent prendre des mesures avisées pour répondre avec rapidité et efficacité.
Suivez ce Webinar d'une heure et découvrez :
• La détection d'événements et Risques mobiles en continue continue
• Les politiques de sécurité et les réglages associées, les règles de conformité pour automatiser l'exécution d'actions correctives
• L'Analyse et l'assainissement des menaces mobiles
• IBM MobileFirst Protect (MaaS360) et l'intégration avec IBM Security QRadar
Traveler is the mobile offering for IBM's messaging platform. At our Connect 2014 conference in Orlando Paul Miller and I discussed our 2013 accomplishments and strategy for 2014 for the Traveler product.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Employees need access to corporate intranets and their business applications from mobile devices. IT wants to increase mobile employee productivity by offering an easy way to access corporate apps, while protecting sensitive company data. BlackBerry Access™ is a secure mobile browser that enables business users to securely access their intranet, a built in enterprise app store and popular productivity applications using their mobile device of choice.
Protect your business data and increase workforce productivity with a complete Enterprise Mobility Management (EMM) solution. BlackBerry delivers the world’s most secure, comprehensive mobile solution to address this new imperative, with support for devices running iOS, Android™, Windows® 10, Mac OS®X and BlackBerry®. Supported BlackBerry smartphones include those powered by both Android OS and by BlackBerry® 10.
The BlackBerry Enterprise Mobility Suite (formerly known as Good Secure EMM Suites) offers the security credentials, accreditations, and technologies that will allow you to mobilize your business tools – from your Microsoft® applications to your custom-built apps. All this with consistent security on mobile devices and other endpoints, across different operating systems and ownership models.
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
The purpose of this presentation is to empower people through intelligent mobile (#TMobilePhones or any smart phone) communication devices and software solutions.
BlackBerry Enterprise Mobility Suite enables enterprises to easily manage users, apps, devices, content and policies. Mobilize your business content, including documents, business intelligence, customer records and more, simply and securely. Users access the content they need, where and when they need it, while IT stays in control for corporate-owned, bring your own and shared use devices. Learn about the features of the suites and find out which fits your stage of mobility adoption.
International Legal Technical Association Dec 09 Peer to Peer article - highlighting your risk of accidental document metadata leakage from mobile devices (e.g. iPhone, Blackberry, Netbook etc)
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
Accroitre la productivité des employés, la assurer la sécurité mobile et de maintenir la visibilité de l'activité d'interface avec le réseau dans le milieu de travail est une responsabilité primordiale pour les professionnels de l'informatique d'aujourd'hui.
Elevez le niveau de vos renseignements sur la Security Mobile
Découvrez comment Système d'information et de gestion des Evénements (SIEM) et La Gestion de la Mobilité d'Entreprise (EMM) offrent une combinaison puissante pour simplifier la surveillance des informations décisionnelles essentielles sur les menaces mobiles moments pertinents, dès leur survenance, à partir d'une vue unique, de sorte que les administrateurs peuvent prendre des mesures avisées pour répondre avec rapidité et efficacité.
Suivez ce Webinar d'une heure et découvrez :
• La détection d'événements et Risques mobiles en continue continue
• Les politiques de sécurité et les réglages associées, les règles de conformité pour automatiser l'exécution d'actions correctives
• L'Analyse et l'assainissement des menaces mobiles
• IBM MobileFirst Protect (MaaS360) et l'intégration avec IBM Security QRadar
Traveler is the mobile offering for IBM's messaging platform. At our Connect 2014 conference in Orlando Paul Miller and I discussed our 2013 accomplishments and strategy for 2014 for the Traveler product.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Statistics for Anaesthesiologists covers basic to intermediate level statistics for researchers especially commonly used study designs or tests in Anaesthesiology research.
The purpose of this monthly analytics report was to demonstrate how our users interacted with the most important areas of our website. This document was simply one aspect of the total report.
Aov is one of the leading manufacturer & exporter from India. Aov offers comprehensive range of cotton, nylon & polyester socks in size & designs to fit individual customer specifications from Middle East, Europe, Canda & USA.
Decision-making speed can be the difference between winning and losing a deal, executing a trade at a profit or loss, and delighting or infuriating a customer. BlackBerry Connect accelerates decision-making by allowing employees to securely connect and collaborate in real time on their choice of mobile device.
Many commonly used instant messaging apps for business were designed for the desktop, and where mobile clients do exist, the messages are unencrypted and vulnerable to potential data loss. BlackBerry Connect delivers proven security. Built on BlackBerry Dynamics, the best-in-class mobile container for app development, it eliminates the threat of data leakage by providing messages with an additional layer of security.
Organizations need to mobilize all their core business apps including collaboration, ISV, and custom-developed apps. However, the conflicting needs of IT, developers and business owners often slow mobile initiatives. A common app platform can speed mobilization by enabling each stakeholder to focus on what they do best.
BlackBerry Dynamics enables IT, developers and business owners to meet their diverse needs and requirements when it comes to mobility, allowing each to focus on its own domain without interfering with other stakeholders.
BlackBerry Unified Endpoint Manager (UEM): Complete Multi-OS Control for Secu...BlackBerry
BlackBerry UEM delivers unified endpoint management and policy control for your diverse and growing fleet of devices and apps. With its single management console and trusted end-to-end security model, it provides the flexibility and security you need to keep your employees connected and protected.
Learn how IBM is using new technologies, applications and mobile devices to enable a smarter, more productive workforce. This short presentation shares IBM's journey enabling a flexible, mobile enterprise.
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
Mainframes host mission critical corporate information and production applications for many financial, healthcare, government and retail companies requiring highly secure systems and regulatory compliance. Demonstrating compliance for your industry can be complex and failure to comply can result in vulnerabilities, audit failures, loss of reputation, security breaches, and even system shut down. How can you simplify enforcement of security policy and best practices? How can you automate security monitoring, threat detection, remediation and compliance reporting? How can you demonstrate governance, risk and compliance on your mainframe? Learn how your modern mainframe can help you to comply with industry regulations, reduce costs and protect your enterprise while supporting cloud, mobile, social and big data environments.
View the full on-demand webcast: https://www2.gotomeeting.com/en_US/island/webinar/registration.tmpl?Action=rgoto&_sf=14
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
The Web@Work Enterprise Mobile Browser enables immediate, secure access to internal websites and web applications without a separate VPN connection. Web@Work preserves a native and high-fidelity web browsing experience.
Securing and Managing Offce 365 with XenMobileCitrix
This paper discusses securely deploying and managing Office 365, protecting data at rest on a mobile device and protecting data in transit. It also explains how to configure Worx Mobile Apps with hosted Exchange. Worx apps, which are enterprise-class apps from Citrix and its development partners, can help users gain additional productivity when using Office 365 hosted services and other Microsoft cloud products such as Azure Active Directory and Azure Rights Management Services.
Modern mobile devices by their capabilities are almost equal to office computers. For working with different types of document or an access to corporate resources, employees often use their own tablets and smartphones ignoring the prohibition of IT service. This BYOD scenario is impossible to avoid. BYOD brings significant risks and often results in confidential data breaches. The usual restrictions are no longer working, businesses are unable to stop employees from bringing personal devices into the workplace, and today every company needs more mobile and flexible solutions.
Wireless mobile content genteration application with RSS feed integrationMike Taylor
Case Study for Wireless content generation application/ Content Management Portal with Integration of RSS and ATOM feeds on Mobile Devices and other hand held devices.visit us @ http://www.brainvire.com/case-study/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
A security system that changed the world
1.
2. BASICS
A Security System
That Changed The World
Enterprise data is a valuable corporate asset, and therefore
ensuring it’s over integrity is an issue of superior business cycle
model to any commercial or government organization.
What you will learn…
What you should know…
• Design of BlackBerry Enterprise Solution
• Mobile malware tendency
• basic knowledge about networking
S
ecurity is the cornerstone of the BlackBerry
legendary security system, allowing users to
confidently access sensitive information at all
times.
The BlackBerry devices, BlackBerry-enabled devices
and supporting technology are developed by Research
In Motion (RIM), a Canadian software and hardware
company based in Waterloo, Ontario.
Special selling feature is that it provides an
integrated wireless messaging system, providing
push email access over cellular wireless networks
throughout the world. Another major factor in the
BlackBerry’s popularity is its comprehensive approach
to security. BlackBerry devices are diversified, and
can be used for a various functions including such
ordinary functions like telephony, SMS, MMS, email,
photos, videos, music, and web-browsing amongst
other things.
End-users are divided into two categories.
•
•
End-user consumers who bought their own
BlackBerry devices, who uses BlackBerry Internet
Service (BIS)
Enterprise end-users who are given the use of a
BlackBerry by their employers with another service
called BlackBerry Enterprise Solution (BES).
The first environment make an end-users are
responsible for the any security measure configuration.
10
In opposition to BES environment where the end-users
have an amount of control, but security is usually
performed by the enterprise by an IT Policy. Here’s a
custom list of BES features, from RIM:
•
•
•
•
•
•
•
Wirelessly synchronize their email, calendar,
contacts, notes and tasks
Manage email folders and search email on the mail
server remotely
Book meetings and appointments, check availability
and forward calendar attachments
Set an out-of-office reply
Edit Microsoft Word, Excel and PowerPoint files
using Documents To Go
Access files stored on the company network
Use mobile applications to access business
systems behind the firewall
The following table identifies the features available with
the BlackBerry Internet Service and the BlackBerry
Enterprise Server.
BlackBerry smartphone applications include inherent
virus protection and spyware protection that is designed
to contain and prevent the spread of viruses and spyware
to other applications. Application controls are available on
BlackBerry smartphones that are running on a BlackBerry
Enterprise Server or on the BlackBerry Internet Service.
BlackBerry smartphone users can use the application
controls on their BlackBerry smartphones to prevent the
02/2011
3. A Security System That Changed The World
installation of specific third-party applications and to limit
the permissions of third-party applications.
BlackBerry Enterprise Solution
The BlackBerry Enterprise Solution (consisting of a
BlackBerry smartphone, BlackBerry Device Software,
BlackBerry Desktop Software, and the BlackBerry
Enterprise Server) is designed to protect organization
from data loss or alteration while a BlackBerry
smartphone user is sending and receiving, reading and
typing messages and accessing your organization’s
data over the wireless network using the BlackBerry
smartphone. In other words solution is designed so
that data remains encrypted at all points between the
BlackBerry smartphone and the BlackBerry Enterprise
Server. Only the BlackBerry Enterprise Server and
the BlackBerry smartphone can access the data that
they send between them, while third-parties, including
service providers, cannot access potentially sensitive
organization information in a decrypted format.
The BlackBerry Enterprise Solution is a flexible, ITfriendly solution that gives mobile users secure wireless
access to their enterprise email and business-critical
applications. The key elements of the BlackBerry
Enterprise Solution architecture include:
•
BlackBerry Enterprise Server – Robust software
that acts as the centralized link between wireless
devices, wireless networks and enterprise
applications. The server integrates with enterprise
messaging and collaboration systems to provide
•
•
•
•
•
mobile users with access to email, enterprise instant
messaging and personal information management
tools. All data between applications and BlackBerry
smartphones flows centrally through the server.
Learn more about BlackBerry integration with
IBM Lotus Domino and IBM Lotus Sametime
Microsoft Exchange and Microsoft Office Live
Communications Server 2005
Novell GroupWise and Novell GroupWise Messenger
BlackBerry Smartphones – Integrated wireless
voice and data devices that are optimized to work
with the BlackBerry Enterprise Solution. They
provide push-based access to email and data from
enterprise applications and systems in addition to
web, MMS, SMS and organizer applications. Learn
more about BlackBerry smartphones
Devices with BlackBerry Connect software
(BlackBerry-enabled Devices) – Devices available
from leading manufacturers that feature BlackBerry
push delivery technology and connect to the
BlackBerry Enterprise Server*.
While the BlackBerry technology has a comprehensive
embedded security system at all levels it’s still
susceptive to a range of attacks. Attacks, in whatever
types, will confer power to design devices are being
backdoored allowing any data (especially confidential
data) to be exported from various blackberry handhelds.
By the way, it’s being used to build covert channels
for attackers, in spite of exploits are digitally signed or
not. Also, the efficiency and success of such attacks
��������
���������
�������
�����
�������
����������������������������
��������
������������������
�������
������������������
������������������
�������
�������
�������
�������
��������� ���������
�������
�������
�����������������
�����������������
����������
�����������
����������
����������
�����������
�����������
�������������������
��������������
Figure 1. BlackBerry Enterprise Solution
www.hakin9.org/en
11
4. BASICS
On The ‘Net
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
http://docs.blackberry.com/en/admin/deliverables/12077/BlackBerry_Enterprise_Server_for_Microsoft_Exchange-Feature_and_
Technical_Overview-T305802-817456-1102035401-001-5.0.1-US.pdf – BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0. Feature and Technical Overview, RIM,
http://docs.blackberry.com/en/admin/deliverables/12035/Security_Technical_Overview.pdf – BlackBerry Enterprise Solution
Version: 5.0. Security Technical Overview, RIM,
http://www.comscore.com/Press_Events/Press_Releases/2010/2/comScore_Reports_December_2009_U.S._Mobile_Subscriber_
Market_Share/(language)/eng-US – December 2010 U.S. Mobile Subscriber Market Share, comScore, 2010,
http://www.comscore.com/Press_Events/Press_Releases/2010/3/comScore_Reports_January_2010_U.S._Mobile_Subscriber_
Market_Share/(language)/eng-US – January 2010 U.S. Mobile Subscriber Market Share, comScore, 2010,
http://www.comscore.com/Press_Events/Press_Releases/2010/4/comScore_Reports_February_2010_U.S._Mobile_Subscriber_
Market_Share/(language)/eng-US – February 2010 U.S. Mobile Subscriber Market Share, comScore, 2010,
http://www.comscore.com/Press_Events/Press_Releases/2010/9/comScore_Reports_July_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports July 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/11/comScore_Reports_September_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports September 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/10/comScore_Reports_August_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports August 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/12/comScore_Reports_October_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports October 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/6/comScore_Reports_April_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports April 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/9/comScore_Reports_July_2010_U.S._Mobile_Subscriber_Market_
Share – comScore Reports July 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/7/comScore_Reports_May_2010_U.S._Mobile_Subscriber_Market_
Share – comScore Reports May 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/3/comScore_Reports_January_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports January 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/4/comScore_Reports_February_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports February 2010 U.S. Mobile Subscriber Market Share
http://www.comscore.com/Press_Events/Press_Releases/2010/5/comScore_Reports_March_2010_U.S._Mobile_Subscriber_
Market_Share – comScore Reports March 2010 U.S. Mobile Subscriber Market Share
depends on the configuration of existing security
controls, i.e. Firewall and IT Policy rules (see Figure 1).
Malware development background
The development of mobile together with wireless
technologies has evidently improved the way
everybody communicates with each other during
the past several years. The growing use of it has
made a good background for re-engineering range
of malwares that identical to PC-malware types, like
viruses, worms, trojans, backdoors, and adwares.
There were major factors requisite for attack on the
Figure 2. ComScore market trend analysis (09.2009 – 10.2010)
12
02/2011
5. A Security System That Changed The World
Table 1. comScore market trend analysis (09.2009 – 10.2010)
Producer
September November
2009
2009
December
2009
January
2010
February
2010
April 2010
July 2010
October
2010
RIM
42,60%
41,60%
40,80%
43,00%
42,10%
41,10%
39,30%
35,80%
Apple
24,10%
25,30%
25,50%
25,10%
25,40%
25,10%
23,80%
24,60%
Microsoft
19,00%
18,00%
19,10%
15,70%
15,10%
14,00%
11,80%
9,70%
Google
2,50%
5,20%
3,80%
7,10%
9,00%
12,00%
17,00%
23,50%
Palm
8,30%
6,10%
7,20%
5,70%
5,40%
4,90%
4,90%
3,90%
smartphone. However, it didn’t happen. This was due
to the rapid changing situation on the mobile handset
market. In spite of Symbian was leading for two years
smartphone producers could shift industry-leading
Nokia in favour of Windows Mobile (Microsoft) and
BlackBerry (RIM).
Faced with the lack of a market leader in mobile
operating systems and as a consequence, the
impossibility of a simultaneous attack on the majority of
users, malware writers had to try to solve the problem
of cross-platform. Solution was the use of Java Micro
Edition. It’s the well-known fact that almost all modern
phones have Java support and allow you to run Javabased applications that can be easily downloaded from
the Internet. Java-based malware made significant
contribution in damage area increasing by involving not
only smartphones users, but also almost every owner of
a mobile phone.
Exemplary malware to do list of realizable actions is
below:
•
•
•
•
•
d
v
e
YURY CHEMERKIN
Graduated at Russian State University for the Humanities
(http://rggu.com/) in 2010. At present postgraduate at RSUH.
Security Analyst since 2009 and currently works as mobile
security researcher in Moscow.
E-mail: yury.chemerkin@gmail.com.
Facebook: http://www.facebook.com/people/Yury-Chemerkin/
100001827345335.
Spreading via Bluetooth and MMS,
Sending SMS, MMS,
Making backdoor background,
Blocking antivirus actions,
Stealing confidential information, etc.
a
Displaced Nokia surrendered the initiative to the RIM,
Apple and Google. According to comScore market
trend analysis RIM is in lead (see Table 1).
Because of security is the cornerstone of the
BlackBerry legendary security system most of
consumers prefer BlackBerry smartphones to another
like iPhone or Android. Cursory acquaintance with the
BlackBerry Solution shows us various products and
components that are designed to extend organization’s
communication methods to BlackBerry devices.
The BlackBerry Solution is designed to help protect
data that is in transit at all points between a device
and the BlackBerry Server. To help it devices use
symmetric key cryptography to encrypt the data sent
between them. Solution uses confidentiality, integrity,
and authenticity, which are principles for information
security, to help protect your organization from data
loss or alteration.
r
t
i
s
e
m
e
n
t
Subscribe to our newsletter
and stay up to date with all
news from Hakin9 magazine!
http://hakin9.org/newsletter