Blog Posts Tagged with "Mobile Devices"


Mobile Providers Must Tap Customer Knowledge

December 25, 2010 Added by:Rahul Neel Mani

Mobile services providers need to build on their intimate knowledge of their customers to differentiate themselves and create compelling, affordable packages, or risk losing customers and revenue...

Comments  (0)


Intel Processor Chips Now 3G "Kill Switch" Enabled

December 21, 2010 Added by:Headlines

SMS kill-switch enabled devices may be vulnerable to unauthorized data deletion or susceptible to being disabled if the systems regulating the mechanism are breached by hackers or by way of an insider threat...

Comments  (0)


Lost Laptops Costing Businesses Billions of Dollars

December 03, 2010 Added by:Headlines

The Study found that more than 80,000 laptops had gone missing from just over 300 companies in the course of a year, with a $50,000 price tag associated with each lost unit. The total cost was over two billion dollars, an average of almost six and a half million dollars per company...

Comments  (0)


Digital Certificates and Mobile Malware Top Threat List

November 23, 2010 Added by:Headlines

Stolen digital certificates and malware infested applications aimed at the growing smartphone and tablet markets top the eight biggest threats for 2011. The frequency of encounters with cyber miscreants may be on the rise as well with the proliferation of Malware as a Service...

Comments  (0)


Billions of Dollars in Security Efforts Rendered Moot

November 17, 2010 Added by:Headlines

A report released by mobile technology vendor iPass reveals that nearly one quarter of employees surveyed admit that they regularly disregard security measures meant to protect sensitive data by accessing corporate networks on non-approved mobile communications devices...

Comments  (1)


Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)


iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)


Protecting Against Mobile Computing Risks

October 31, 2010 Added by:Allan Pratt, MBA

With all the hoopla about mobile computing, everyone knows the basic concerns. There are the geographical concerns, the financial concerns, the information security concerns, and, of course, there is the physical security issues...

Comments  (0)


Reining In Enterprise Mobile Computing Risks

October 07, 2010 Added by:Rebecca Herold

As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information. It is vital that an effective mobile computing device and storage media security and privacy management program is in place...

Comments  (0)


Supreme Court: You Can Spy on Employees if...

July 08, 2010 Added by:Katie Weaver-Johnson

After several lower court rulings, the Supreme Court ruled that because the employers suspected that people were breaking the rules and using their mobile devices and pagers for non-business communications, the employers were justified in requesting and reading the text message transcripts...

Comments  (2)


Mobile Banking Application Development

June 22, 2010 Added by:Brent Huston

Lately, we have been looking at a lot of banking apps and front ends for the iPhone, Android and other mobile devices in the lab. Our testing thus far has shown some great results and it seems like a lot of banks, credit unions and other financial institutions are interested in having an “app” for their customers and members.

Comments  (0)


How Secure is your Mobile Phone?

June 11, 2010 Added by:Robert Siciliano

I love my iPhone. The fact that I have a full web browser and can access all my data anytime from anywhere is fantastic. Plus my iPhone allows me to peek in on my home security system with an application that’s connected to my home security cameras. If I’m on the road I can log in and see the family doing whatever activities in our outside the home.

Comments  (4)


Is That Portable Device a Data Hazard?

April 06, 2010 Added by:Robert Siciliano

According to a survey  of London and New York City taxi companies last year revealed that more than 12,500 devices, such as laptops, iPods and memory sticks, are forgotten in taxis every six months. Portable devices that may have troves of sensitive data.

Comments  (1)

Page « < 10 - 11 - 12 - 13 - 14 > »