Blog Posts Tagged with "Wireless"

6d117b57d55f63febe392e40a478011f

Laptop and Cell Phone Data Searched at Airport

November 22, 2010 Added by:Anthony M. Freed

Your computer and cellphone data can be searched by customs officials. If it is really the case that authorities can act as if our Constitutional rights end at the airport terminal, we have much bigger problems than naked body scans and groping screeners touching our junk...

Comments  (8)

37d5f81e2277051bc17116221040d51c

Mobile Phone Security Under Attack

November 11, 2010 Added by:Robert Siciliano

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. As applications and other content are more widely distributed, security breaches will be inevitable...

Comments  (0)

7e6249b5c7f6b63c28587c820b16edcb

Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)

A6a8f6bad925fe4167d82a398acc0d10

GPS Tracking of Stolen Cell Phone Nabs Thief

November 01, 2010 Added by:Stephen Gantz

As private individuals, the victims were well within their legal rights to track the suspect and their location. This is not the case for law enforcement personnel in general, who are required to obtain subpoenas before they can access tracking data...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Protecting Against Mobile Computing Risks

October 31, 2010 Added by:Allan Pratt, MBA

With all the hoopla about mobile computing, everyone knows the basic concerns. There are the geographical concerns, the financial concerns, the information security concerns, and, of course, there is the physical security issues...

Comments  (0)

7e6249b5c7f6b63c28587c820b16edcb

Google Street View and Unencrypted Wi-Fi: Not a Hazard

October 25, 2010 Added by:Robert Gezelter

The effort being focused on Google would be far better spent on educating users about the hazards. Google is caught being an identifiable target. The Street Wise vehicle cruising down the block every few years is not a serious hazard to privacy and security...

Comments  (1)

E973b16363b3de77b360563237df7e32

Is Geo Location Based DDoS Possible?

October 19, 2010 Added by:Bozidar Spirovski

There are 4.6 billion mobile phones worldwide, a truly formidable number capable of performing a DDoS attack on any mobile network. But creating a DDoS attack isn't simple - especially a Geo Location based DDoS. In order to make a DDoS attack, you need the following ingredients...

Comments  (2)

959779642e6e758563e80b5d83150a9f

Will Smart Phones Replace Credit Cards?

September 22, 2010 Added by:Danny Lieberman

Mobile payment technology has been around for about 10 years and it has not really taken off in a big way – although there are niche applications. Clearly it’s not a technology barrier to entry but a cultural barrier to entry...

Comments  (0)

E376ca757c1ebdfbca96615bf71247bb

Weaponizing the Nokia N900 - Part 2

September 21, 2010 Added by:shawn merdinger

Welcome to the 2nd post in my series of leveraging the power of the Nokia N900 handheld using opensource, cutting-edge security tools for ethical penetration testing. The idea is to cover security-related tools and packages that enhance the N900's capability as a penetration testing platform...

Comments  (0)

F520f65cba281c31e29c857faa651872

Telecom Development: Simple Rules, No Magic

September 10, 2010 Added by:Rahul Neel Mani

The pace of growth at Reliance Communications is faster than that of other leading telcos in India, says Alpna Doshi, CIO, Reliance Communications. In a chat with Rahul Neel Mani, she outlines the company’s IT plans and growth initiatives in the immediate future...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Mobile Banking Application Development

September 09, 2010 Added by:Brent Huston

A lot of financial institutions are interested in having a mobile app for their customers and members. Many of these apps are well designed, deep and rich. Many are simply canned front ends to existing web page content and functionality. A few are just plain horrible...

Comments  (3)

E376ca757c1ebdfbca96615bf71247bb

It's a Feature - Remote Tapping a Snom VoIP Phone

September 07, 2010 Added by:shawn merdinger

An attacker could search for Snom phones exposed on the Internet, determine if they are using HTTP authentication or not, and easily connect the the Snom VoIP phone's webserver and punch in the number to dial -- clearly opening up avenues to cause grief. Pretty bad stuff, right?

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Good Reasons to Lock Down Your Wireless Network

September 05, 2010 Added by:Christopher Burgess

Anyone in proximity to your business, home or office may be within the exploitable footprint of Wi-Fi signal, they can collect your SSID and MAC addresses, and if your network is not secured, their odds of being able to collect information traversing the connection increases exponentially...

Comments  (4)

16443e0c6f6e4a400fd0164b3c406170

Location Based Services - A Double-Edged Sword

August 31, 2010 Added by:Christopher Burgess

How about you? Are you appending your geo-coordinates or location to each social network update you are creating, be it on Twitter, Facebook, SkyRock, Sonico, Qzone or the like? I see the use of location-based services as both reasonable and worrisome...

Comments  (0)

37d5f81e2277051bc17116221040d51c

mCrime Higher on Hackers’ Radar

August 30, 2010 Added by:Robert Siciliano

Over the next few years as millions of smartphones replace handhelds and billions of applications are downloaded, risks of mobile crime - mCrime - will rise. Large antivirus companies are snapping up smaller mobile phone security companies in anticipation of a deluge of mobile attacks...

Comments  (3)

D8853ae281be8cfdfa18ab73608e8c3f

iPhone Geo Blocking and Your Privacy

August 24, 2010 Added by:Rob Fuller

Earlier this summer I was approached by Savant, who told me that a bunch of my Twitpics had geo location in them. At a recent NoVA Hackers meetup there was a presentation about Geo forensics on mobile phones that was really enlightening, but very depressing for iPhone users like myself...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »