No matter how much layer of security you implement on a computer there always will be one area that is protected by a simple old access control, the memory.
You can have a complex password policy, dual factor authentication, full disk encryption, file encryption which could even be extended through the use of an Information Right Management solution, for that protected information to be accessed and manipulated it needs to be decrypted into memory.
The security of that data in memory then relies on memory access control and proper segregation, I am not sure we can talk about memory sandboxing but thats the same idea. The data will, of course, also rely on the physical security of the device it is hosted on.
Gaining administrator access on that device would therefore grant you access to the full memory.
This last point is of significance.
For IRM solutions, being an administrator on a device does not necessarily mean you also have access to the users IR...
>>[READ MORE]
The inevitable rise of malware on mobile devices
#31 - Posted on
21 February 2011 - Author: SM - Category: Security
Although it has been announced for quite some time that malware is growing on the mobile market, it is still not very visible.
That does not mean it isn’t already here or will be.
Below is an interesting article on a mobile developer who was contacted by a company that wanted to pay him some money as long as he included some of their “codes” into his popular game.
It was in fact, malware. It could directly call premium number without the user intervention or even eavesdrop on the microphone.
It has a happy ending as the developer decided against using that code and instead warn others. But for one good deed, how many have fallen or will fall for the money?
Websense Article on the White Hat Developer
Now the question is: Would this be possible on the iPhone with the Apps Store?
...
>>[READ MORE]