Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

6/24/2008
05:47 PM
50%
50%

Sybase Adds To Mobile Security Line

Sybase iAnywhere has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

As more businesses adopt smartphones, mobile security is a growing concern. But data encryption and remote wiping may not be enough to protect a company.

"The tremendous growth in adoption of converged mobile devices occurring among business professionals will inevitably bring with it a rise in the number of attacks and in the sophistication of viruses and other malware specifically targeting these devices," said Sean Ryan, research analyst at IDC, in a statement.

To address the growing concern, Sybase iAnywhere announced Monday it has expanded its mobile security portfolio to include handheld antivirus and firewall capabilities.

There are already more than 500 identified viruses that target business mobile phones, according to Terry Stepian, president of Sybase iAnywhere. That figure is expected to increase dramatically as smartphones proliferate, and these viruses could potentially lead to nightmare scenarios of corporate data theft or billing fiascos if a device gets a dialer Trojan.

The company's Afaria mobile security line already provides features like device authentication and data encryption, but the latest additions should help businesses stay ahead of the hackers, Stepian said.

The antivirus is the first mobile security product of its kind that utilizes heuristic technology to analyze incoming files based on their behavior, the company said. This technology is widely used in desktop products to discover viruses and malware.

The antivirus also features automatic signature file updates to get up to date protection, and it has real-time scanning of any file the mobile phone receives.

Afaria's firewall manager lets IT administrators filter inbound and outbound communication on the device by using black lists and white lists. Additionally, administrators can minimize mobile spam by establishing customized black lists to block SMS, MMS, or incoming calls. The end user can also add to the blacklist with the push of a button, Stepian said.

These products have been specifically developed for mobile devices, with the express goal of not draining computing power or battery life, according to Stepian.

The mobile security suite supports a broad range of mobile operating systems including BlackBerry, Windows Mobile, Symbian, and more. The new Afaria antivirus and firewall protection capabilities will be available by July 1.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: The old using of sock puppets for Shoulder Surfing technique. 
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17513
PUBLISHED: 2019-10-18
An issue was discovered in Ratpack before 1.7.5. Due to a misuse of the Netty library class DefaultHttpHeaders, there is no validation that headers lack HTTP control characters. Thus, if untrusted data is used to construct HTTP headers with Ratpack, HTTP Response Splitting can occur.
CVE-2019-8216
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8217
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-8218
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure .
CVE-2019-8219
PUBLISHED: 2019-10-17
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .