Triumph of the geek

Hats off to Apple for another in a two-decade long series of electrifying product announcements yesterday.

While Hollywood is the master at creating frenzy over a new release, often spending as much on marketing as production, the enthusiasm with which Apple announcements are greeted is no less hysterical. But in Apple’s case, the passion is most often justified. The products deserve the impassioned response. They deliver, they’re innovative, they’re simple to operate, they do what they’re supposed to.

I received perhaps 20 different press releases yesterday announcing some aspect of the new iPhone 3G. There was a separate release for each country in which the device was about to receive distribution (July 11, in case you were in a coma). And there were a number of third-party partnership announcements.

One of the key developments with the new generation communication device is its integration into enterprise use. That is, Apple is making every effort to increase its appeal to business users. The new iPhone 3G now supports Microsoft Exchange ActiveSync, which allows road warriors to send and receive email and have access to their calendar and contacts. It also gives mobile users the ability to securely tap into the corporate network via Cisco IPsec VPN and wireless network services with WPA2 Enterprise and 802.1X authentication.

On top of all this, Apple has made it simple for anyone to create applications to be used on the iPhone.

And that’s what information security professionals need to take a look at. In all the news and hoopla greeting the introduction of the iPhone 3G, there was not a word about security issues these wireless tools and third-party apps may bring to the market.

The technology is moving swiftly. But along with these tremendous developments come attendant potential calamities – everything from new generations of malware developed specifically for mobile networks, to viruses introduced via third-party apps.

Apple, so far, has largely avoided the infections that have targeted Microsoft products. But now that the Cupertino, Calif.-based company is increasing its alliance with the Redmond, Wash.-based company in this move to grab a larger enterprise market share – not to mention a growing share of the consumer market as well, particularly with the price point coming down significantly – it wouldn't be unexpected to see a growth in attacks spreading via the iPhone network.

What’s being done to keep the network secure? We’ll do our best to stay on top of developments. Let us know what you know.
close

Next Article in The News Team Blog

Advertisement

How to Prevent Insider Threats!

POLL

More in The News Team Blog

The power and danger of using the cyber "T" word

Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?

Here are eight cyber crooks who got less prison time than Andrew Auernheimer

Here are eight cyber crooks who got less ...

The security researcher and self-proclaimed internet troll earned 41 months behind bars Monday for his role in using a script to retrieve data on roughly 120,000 Apple iPad users from ...

The White House thinks Julian Assange and Jeremy Hammond are no different ...

Whistleblowing organizations like WikiLeaks and accused hacktivists like Hammond are not foreign spies lusting to plunder intellectual property from U.S. corporations and government agencies in order to profit and gain a competitive advantage.