Facebook Messenger App Drawing Similarities to Spyware

It should come as no surprise that most mobile apps run some sort of analytics on user behaviour. But in the case of Facebook, the social network’s Messenger app for iOS apparently tracks quite a bit more than most users likely realize.

 

iOS forensics and security researcher Jonathan Zdziarski spent Tuesday morning disassembling Facebook Messenger’s iOS binary, at one point declaring via Twitterthat “Messenger appears to have more spyware type code in it than I’ve seen in products intended specifically for enterprise surveillance.”

You can read the rest at: Facebook’s Messenger App is Tracking a Lot More of your Data Than You Think

Why You Need A Good BYOD Policy

McAffee did research that shows that 3.7 millions samples of Android malware were observed in 2.1  That is three times the 1.3 million samples in 2012.  Many organization are aware of this which is why it is believed that implementation of BYOD policies will more than double in the next two years from 31% in 2014 to 77% in 2016.  You can read more in the infographic below from McAffee which is borrowed from Biztech Magazine

Courtesy of Biztech Magazine

information governance versus information management

Governance is about taking ownership, making decisions and setting rules. Management is about acting on the decisions, executing the policies and enforcing the rules. Therefore, Information Governance and Information Management are not the same thing and the two terms should not be used interchangeably!

The above quote is taken from an insightful post from George Parapadakis entitled “Stop comparing information governance to records management.”  He includes eight key differences between information governance and records management.

When disposition goes wrong

Old city records containing personal information about military veterans were found blowing around Quincy, Mass., on Tuesday, the Patriot Ledger reports.

The records, which date from the 1950s through the 1980s, contain social security numbers, bank account information, healthcare data and benefit claims. A Patriot Ledger reporter found the records blowing around the Russell Park area near Quincy High School.

Henry Bradley, Quincy’s acting director of veterans services, said the department had hired shredding company Shred King to haul off 85 boxes containing around 240,000 old veterans’ records…

City employees carried out a search on Wednesday in the Russell Park area and found dozens of additional veterans’ records blowing in the wind.

http://ow.ly/wcSLv

Read more: The personal data, my friend, is blowin’ in the wind – FierceITSecurity http://www.fierceitsecurity.com/story/personal-data-my-friend-blowin-wind/2014-04-24#ixzz305MOS0E2
Subscribe at FierceITSecurity

Don’t Follow Best Practices, Start With ECM instead of RIM and Other Tips From Richard Medina To Succeed With Information Governance

Richard Medina of DocuLabs offers these four tips of pragmatically succeeding with information governance.  

1)Clarify The Scope of Information Governance and Don’t Overreach

If your IG program succeeds at protecting your organization from information risk and risk-related costs, it’s a successful program. But if it fails to protect you — whether or not it improves the operational efficiency of some of your business processes — it’s a failure.

 

2)Always Design Your Approach To Optimize Partial Failure

Be sure to model failure and “half-baked” scenarios — scenarios where you have to stop at various points in your roadmap. Make sure you can optimize a completely uneventful, successful implementation. But have lots of “Plan Bs.”

 

3)If You Want ‘Offensive’ Benefits As Well As ‘Defensive’ Benefits, do ECM First

The past twenty years of enterprise document management systems and then enterprise content management (ECM) have demonstrated that leading with records management (RM) or IG is a bad approach if you want to meet significant offensive requirements in addition to defensive requirements

4)Recognize That Most ‘Best Practices’ May Not Deserve That Title

There’s little empirical evaluation of “Best Practices” in any field, let alone rapidly developing areas of IT and IG. So the “Best Practices” are often primarily the ones that have been most successful in reproducing themselves. None of this means that you shouldn’t follow them. They may be the best practices you can get. But you should try to be clear about the limits of their applicability and how best to use them.

 

For more detail I’d recommend hoping over to CMS Wire to read the full article: Be Pragmatic To Succeed In Information Governance

Deleted Tweets Are Still Discoverable

Oscar Pistorius was quizzed Monday about a tweet he sent months before fatally shooting his girlfriend Reeva Steenkamp in which the Olympian discussed going into “full combat recon mode.”

Prosecutor Gerrie Nel said Pistorius, who is accused of murder, seemed like a person in control of the situation as he approached his bathroom holding a firearm early on Feb. 14 last year. He asked about the tweet Pistorius sent in November 2012 but has since been deleted.

You can read the full story at NBC News

Follow

Get every new post delivered to your Inbox.

Join 387 other followers