Blog Posts Tagged with "Mobile Devices"

37d5f81e2277051bc17116221040d51c

Preparing a Mobile or PC for Resale or Donation

July 29, 2011 Added by:Robert Siciliano

You may have read my last post where I talked about “Clean the Clutter” out of your life and sell all the stuff you don’t absolutely need. Prior to selling my electronics I wiped all the data off of each device. Cleaning all the data off your salable electronics is absolutely essential...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Senate Questions NSA Lawyer on Geolocation Tracking

July 27, 2011 Added by:Headlines

At hearings conducted by the Senate, general counsel for the NSA Matthew Olsen was reluctant to specify whether the government can track the movements of U.S. citizens. “There are certain circumstances where that authority may exist. It is a very complicated question," Olsen said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senators Inquire About Gov Mobile Phone Tracking

July 15, 2011 Added by:Headlines

Senators Ron Wyden and Mark Udall have drafted a letter addressed to Director of National Intelligence James Clapper with a simple, straight forward question: “Do government agencies have the authority to collect the geolocation information of American citizens for intelligence purposes?”

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Is Your Smartphone Safe From Mobile Hacking?

July 14, 2011 Added by:Headlines

“If I had money right now, I’d bet on the Russian mafia. Mobile hacking is going to be huge," said Steve Santorelli, director of global outreach at the Internet security research group Team Cymru...

Comments  (2)

Fc152e73692bc3c934d248f639d9e963

PCI SSC Nixes Certification for Mobile Payments Apps

June 30, 2011 Added by:PCI Guru

"Until such time that it has completed a comprehensive examination of the mobile communications device and payment application landscape, the Council will not approve mobile payment applications used by merchants to accept and process payment as validated PA-DSS applications..."

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Worse Than Zombies: The Mobile Botnets Are Coming

June 14, 2011 Added by:Kelly Colgan

As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Google Zaps More Infected Android Applications

June 13, 2011 Added by:Headlines

"It [Plankton] has the ability to remotely access a command-and-control [C&C] server for instructions, and upload additional payloads. It uses a very stealthy method to push any malware it wants to phone... This is pretty serious..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DHS Should Halt Suspicionless Searches at Border

June 01, 2011 Added by:Headlines

"The continual evolution in how people use electronic devices in their everyday lives creates growing tension between the Fourth Amendment guarantees and what historically has been viewed as a narrow exception to the requirements for probable cause and a warrant..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Warrantless Cell Phone Searches on the Rise

May 31, 2011 Added by:Headlines

"The police can ask you to unlock the phone -- which many people will do -- but they almost certainly cannot compel you to unlock your phone without the involvement of a judge..."

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Weaponizing the Nokia N900 Part 3.8: Backtrack 5

May 31, 2011 Added by:Kyle Young

You could setup your N900 on a victim network and have ssh listing on your public IPv6 address and then log in to your N900 from an outside network over IPv6. You wouldn’t even have to do any port forwarding on the victim’s firewall/gateway/router...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Payments Set to Dramatically Increase

May 26, 2011 Added by:Robert Siciliano

The Payment Card Industry Standards Council is not yet granting approval to any mobile payment applications. With the explosive growth of the mobile payment industry, they are holding off and waiting to see which technologies rise to the top...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Las Vegas Wants to be Your Friend on Facebook

May 23, 2011 Added by:Rafal Los

Sadly, as your privacy shrinks - or as you give more and more of it away - the possibility of that crazy night in "Sin City" will follow you not just to work on Monday, but maybe to the next time a hacker is trying to penetrate your applications attack surface...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Sophos Releases Report on the State of Data Security

May 23, 2011 Added by:Headlines

With the consumerization of IT, rapid adoption of mobile technologies, social media, virtualization, and cloud computing – emerging technologies are presenting new challenges for companies looking to protect their data...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Analysis of the Senate Hearings on Mobile Privacy

May 22, 2011 Added by:David Navetta

The rapid growth of mobile products and services raises several concerns: mobile devices are always on and always with the consumer, mobile devices contain information that is highly personal in nature, and companies have the ability to track consumers who use mobile devices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: SMB's Lack Understanding of Mobile Security

May 20, 2011 Added by:Headlines

The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Convenience or Security?

May 19, 2011 Added by:Emmett Jorgensen

Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...

Comments  (0)

Page « < 7 - 8 - 9 - 10 - 11 > »