Blog Posts Tagged with "Smart Phone"

6ba13f7544750cd81809eb83d296112a

Do You Need a Formal Policy for Managing Mobile Devices?

March 28, 2012 Added by:Kyle Lagunas

Security risks associated with BYOD policies continue to intimidate some - one respondent said he is “scared to death of security vulnerabilities” - but what would do more to minimize risks than to adopt an official policy?

Comments  (0)

Bddc4983168ae96da4b83bdd01b51548

Shutting Front and Back Door Access to Your Mobile Devices

March 27, 2012 Added by:Kevin Doel

A lost or stolen phone constitutes a serious security threat to the information on the device because the attacker has unlimited time to gain access to the secrets that are stored therein. Important personal information should not be stored in any unsecured note application...

Comments  (0)

E973b16363b3de77b360563237df7e32

Seven Problems with Cell Phone Forensics

March 26, 2012 Added by:Bozidar Spirovski

Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...

Comments  (5)

37d5f81e2277051bc17116221040d51c

Nearly Five Percent of All Smartphones Lost Every Year

March 20, 2012 Added by:Robert Siciliano

Based on the costly consequences of lost data assets, it makes sense to allocate the necessary resources to invest in anti-theft and data protection solutions in order to secure smartphones and the sensitive and confidential information they contain...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Top 5 Things Learned at the SANS Mobile Device Security Summit

March 19, 2012 Added by:Tom Eston

Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

CyLab's AppScanner: Cloud-Based Mobile Application Security

March 19, 2012 Added by:Headlines

"Our envisioned service builds on crowdsourcing, virtualization, and automation to enable large-scale analysis of apps. AppScanner provides end-users with more understandable information regarding what mobile apps are really doing on their devices..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

I Found Your Data on that Used Device You Sold...

March 14, 2012 Added by:Robert Siciliano

What did you do with all of your old devices? Some were probably given away, or you might have hocked a few on eBay or Craigslist. Did you know it is very likely that you inadvertently put all of your digital data in someone else’s hands?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CyLab Researchers Release Free Smartphone Security App

March 14, 2012 Added by:Headlines

"SafeSlinger provides you with the confidence that the person you are communicating with is actually the person they have represented themselves to be... SafeSlinger provides secure communications and file transfer even if the servers involved are tainted with malware..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Safe is Paying Online with Your Smart Phone?

March 13, 2012 Added by:Robert Siciliano

Handset manufacturers, application developers, and mobile security vendors continue working to improve mobile security. Banks are offering a consistent sign-on experience for both their online and mobile channels, including multifactor authentication programs for mobile...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Do You Have A False Sense of Security for Mobile?

March 02, 2012 Added by:Robert Siciliano

With unit sales of smartphones and tablets eclipsing those of desktop and laptop PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. Protect yourself...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Targeting of Android Devices Leads Malware Trends for 2012

February 24, 2012 Added by:Headlines

"Smartphones and tablets are finally delivering consumers with these converged and connected experiences we've been promised for so long. But this is a double edged sword: as smart device usage becomes more sophisticated, so too are cyber criminals' methods of attacking..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Demonstrate Cell Phone Tracking Vulnerability

February 20, 2012 Added by:Headlines

Researchers at the University of Minnesota’s College of Science and Engineering have revealed a technique that could allow an unauthorized third-party to track the location of a cell phone using data available from cellular networks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Secret Service Hits $250 Million Cell Phone Cloning Ring

February 07, 2012 Added by:Headlines

U.S. Secret Service’s New York Field Office recently investigated a sophisticated operation in which information from the cell phone accounts of tens of thousands of people is stolen to support a black market in international calling...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Google Wallet and PCI Compliance

January 30, 2012 Added by:PCI Guru

Hackers could decrypt the PAN given the high likelihood that the PIN to decrypt the PAN could be derived from information on a smartphone. The nightmare scenario would be development of malware delivered through the smartphone’s application store that harvests the PII...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Necessary Security Updates for 2012

January 24, 2012 Added by:Robert Siciliano

Never before have so many criminals been so organized across borders as they are today. The Internet has spawned international crime syndicates of the best criminal minds who seek to take from you, your government, and all the merchants we rely on to provide products and services...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Mandatory Data Retention, Smart Meter Hacks and Silent SMS

January 23, 2012 Added by:Electronic Frontier Foundation

Silent SMS delivers a text message without the user being aware, but leads to the creation of a log with the cell phone company that reveals what cell phone towers the phone was closest to, revealing the phone’s location to help with tracking...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »