Blog Posts Tagged with "Mobile Devices"
July 29, 2011 Added by:Robert Siciliano
You may have read my last post where I talked about “Clean the Clutter” out of your life and sell all the stuff you don’t absolutely need. Prior to selling my electronics I wiped all the data off of each device. Cleaning all the data off your salable electronics is absolutely essential...
July 27, 2011 Added by:Headlines
At hearings conducted by the Senate, general counsel for the NSA Matthew Olsen was reluctant to specify whether the government can track the movements of U.S. citizens. “There are certain circumstances where that authority may exist. It is a very complicated question," Olsen said...
July 15, 2011 Added by:Headlines
Senators Ron Wyden and Mark Udall have drafted a letter addressed to Director of National Intelligence James Clapper with a simple, straight forward question: “Do government agencies have the authority to collect the geolocation information of American citizens for intelligence purposes?”
June 30, 2011 Added by:PCI Guru
"Until such time that it has completed a comprehensive examination of the mobile communications device and payment application landscape, the Council will not approve mobile payment applications used by merchants to accept and process payment as validated PA-DSS applications..."
June 14, 2011 Added by:Kelly Colgan
As our smartphones have become our wallets and personal computers, holding everything from banking to social network information, they’ve become targets for hackers, scammers and criminals. Our phones hold a treasure trove of data—and the bad guys know it...
June 13, 2011 Added by:Headlines
"It [Plankton] has the ability to remotely access a command-and-control [C&C] server for instructions, and upload additional payloads. It uses a very stealthy method to push any malware it wants to phone... This is pretty serious..."
June 01, 2011 Added by:Headlines
"The continual evolution in how people use electronic devices in their everyday lives creates growing tension between the Fourth Amendment guarantees and what historically has been viewed as a narrow exception to the requirements for probable cause and a warrant..."
May 31, 2011 Added by:Kyle Young
You could setup your N900 on a victim network and have ssh listing on your public IPv6 address and then log in to your N900 from an outside network over IPv6. You wouldn’t even have to do any port forwarding on the victim’s firewall/gateway/router...
May 26, 2011 Added by:Robert Siciliano
The Payment Card Industry Standards Council is not yet granting approval to any mobile payment applications. With the explosive growth of the mobile payment industry, they are holding off and waiting to see which technologies rise to the top...
May 23, 2011 Added by:Rafal Los
Sadly, as your privacy shrinks - or as you give more and more of it away - the possibility of that crazy night in "Sin City" will follow you not just to work on Monday, but maybe to the next time a hacker is trying to penetrate your applications attack surface...
May 23, 2011 Added by:Headlines
With the consumerization of IT, rapid adoption of mobile technologies, social media, virtualization, and cloud computing – emerging technologies are presenting new challenges for companies looking to protect their data...
May 22, 2011 Added by:David Navetta
The rapid growth of mobile products and services raises several concerns: mobile devices are always on and always with the consumer, mobile devices contain information that is highly personal in nature, and companies have the ability to track consumers who use mobile devices...
May 20, 2011 Added by:Headlines
The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...
May 19, 2011 Added by:Emmett Jorgensen
Can mobile devices be managed without limiting their functionality and convenience? Obviously, there’s no easy answer to this question. Much of how an organization handles its security policy depends on the type of business it is and the sensitivity of the information being handled...
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015