Blog Posts Tagged with "Mobile Devices"

2e541940bc9b12ea62726bb51ed8787d

BYOD - It's a Personal Matter

May 16, 2012 Added by:Phil Klassen

When you own something, especially a mobile device, there is a sense of entitlement that the individual has. So it's critical that you establish the fact that using a personal device to do company business is a privilege, not a right, and that privilege can be taken away...

Comments  (0)

099757b145caa6965ea51494adbc25ba

The Importance of Mobile Device Management for Enterprise Security

May 13, 2012 Added by:Drayton Graham

Almost everyone has their own mobile phone these days, nd they are quickly becoming a necessity in business. In order to enable the kind of freedom BYOD brings, the corporate network and data needs to be protected. Mobile Device Management is a solution that will help with this...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

A Field Guide to Post-UDID Unique IDs on iOS

May 10, 2012 Added by:Fergal Glynn

Ongoing developments in the device-wide ID space focus on two dueling schemes and codebases: OpenUDID and SecureUDID. If you’re an iOS developer, this will serve as an introduction to the details of these systems, including their limitations and potential for data leakage...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

DOJ: Any Protection is too Much for Cell Phone Tracking

May 08, 2012 Added by:Electronic Frontier Foundation

For years, we've been arguing that cell phone location data should only be accessible to law enforcement with a search warrant. After all, as web enabled smart phones become more prevalent, this location data reveals an incredibly revealing portrait of your every move...

Comments  (0)

2e541940bc9b12ea62726bb51ed8787d

BYOD is really BYOPMD

May 07, 2012 Added by:Phil Klassen

BYOD should make the security society very nervous. For those who still believe that personal devices will never be a part of your network, remember, never say never. Regardless if non-corporate devices have accessed your network or not, the first step is acceptable use policy...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Your New Best Friend May Not Protect You

May 05, 2012 Added by:Robert Siciliano

Your mobile phone may be your new best friend. Four out of seven people have mobile phones, because a phone really is a great companion that brings us into contact with people, media, music, and finances. But unlike a German Shepherd, your mobile isn’t a security device...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Online Banking vs. Mobile Banking

May 03, 2012 Added by:Robert Siciliano

Mobile banking can offer additional security by enabling text-backs, as a second form of authentication. If you use your smartphone to access your bank’s website directly, it may recognize that you are using a mobile browser and automatically offer you a dedicated application...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Remember Public Cellular Networks in Smart Meter Adoption

April 26, 2012 Added by:Brent Huston

ICS/SCADA owners must strive to clearly identify their needs around cellular technologies, clearly demarcate the requirements for private/segmented/public cellular network use and understand the benefits/issues and threats of what they are utilizing...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

The Security, Privacy and Legal Implications of BYOD

April 24, 2012 Added by:David Navetta

Some organizations believe that BYOD will allow them to avoid significant costs. Other companies believe that company data on personal devices is inevitable. Unfortunately, BYOD raises significant data security concerns which can lead to potential legal risk...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

On Cyber Threats in the Mobile Environment

April 20, 2012 Added by:Pierluigi Paganini

Mobile threats should alarm private industry, as the risk of data exposure is high due the growth of the mobile sector. Cyber criminals and governments are aware of the value of information to be gained from our mobile devices and are showing an increased interest in the sector...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Botnets a Growing National Security Concern

April 13, 2012 Added by:Pierluigi Paganini

There is no clear line between cybercrime and cyber warfare, and botnets are a serious threat with tremendous offensive potential. Through a botnet it is possible to attack the nerve centers of a country, and isolated attacks can target critical infrastructure...

Comments  (1)

37d5f81e2277051bc17116221040d51c

On Location-Based Services Security

April 09, 2012 Added by:Robert Siciliano

Social networking sites are incorporating location-based services that allow users to broadcast their locations. Carnegie Mellon University has identified more than 80 services that either lack privacy policies or collect and save user data for an indefinite period...

Comments  (0)

Bddc4983168ae96da4b83bdd01b51548

Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)

6ba13f7544750cd81809eb83d296112a

Do You Need a Formal Policy for Managing Mobile Devices?

March 28, 2012 Added by:Kyle Lagunas

Security risks associated with BYOD policies continue to intimidate some - one respondent said he is “scared to death of security vulnerabilities” - but what would do more to minimize risks than to adopt an official policy?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Applications Need to Respect User Rights From the Start

March 28, 2012 Added by:Electronic Frontier Foundation

By installing and authorizing an app, users don’t know how much information they are handing over. Without details about policies and practices, how confident can they be in the security of that data against the threat of subpoenas, intrusions, or rogue employees?

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »
Most Liked