Blog Posts Tagged with "Smart Phone"

0a8cae998f9c51e3b3c0ccbaddf521aa

Significance of 'Death of the Document Web' to Security

January 18, 2012 Added by:Rafal Los

Infosec pros just started getting comfy with profiling, analyzing, and defending web-based apps from a server, consumed by a human, and used in a browser. Hang on tight because the world just took a sharp left and if you're not buckled in you're bound to be thrown from the bus...

Comments  (2)

1a490136c27502563c62267354024cd5

That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

Mobile Security: Android vs. iOS - An Infographic

January 12, 2012 Added by:Fergal Glynn

With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern. This infographic examines the security features of Android and iOS, and also takes a look at their strengths and weaknesses...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Don't Forget About E-Waste During the Holidays

December 27, 2011 Added by:Allan Pratt, MBA

How much time have you spent deciding what to do with the outdated smartphones, tablets, televisions, and computers? Don’t throw them out with the regular garbage. Instead, consider the environment, but first, take security precautions...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)

Fe3139b2aae983885565da7757da08a8

Android Apps Violate Permissions - But Who Cares, Right?

December 06, 2011 Added by:Ed Moyle

These guys built a tool called "woodpecker" that snakes around inside popular Android phone platforms looking for places where the phone is configured so as to violate the Android permission enforcement model. Go read it - you'd be surprised what they've found...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Android Facial Recognition Feature Defeated by Photo

November 14, 2011 Added by:Headlines

"It was safe to assume that Google wouldn't let its face-recognition technology be bypassed using a photo but this confirms it. Good news for those who were worried about their friends hacking their smartphone by using a Facebook profile photo or something similar..."

Comments  (1)

44fa7dab2a22dc03b6a1de4a35b7834a

The Impact of Mobility on the SMB Workforce

November 04, 2011 Added by:Bill Gerneglia

Small and medium businesses are increasingly more mobile as their employees are demanding increased access from both the home and the road like never before. SMBs face a wide range of challenges when it comes to providing this access for these mobile workforces...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Mobile Malware and How to Defend Against It

October 05, 2011 Added by:Dan Dieterle

A lot was covered, including how hackers are creating apps that pass verification and are published in the app store, but when installed, pull down malicious updates. Bluetooth vulnerabilities and a “Truly Evil Hack” were also discussed...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Smartphones and Banking Application Security

September 22, 2011 Added by:Brent Huston

As device manufacturers continue to add processing power and storage capacity, and platform vendors provide more applications for generating and consuming data, security will become a greater concern as attackers look upon it as their new playground...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Mobile Device Security: The Matrix in 2011

August 15, 2011 Added by:Simon Heron

Remember that scene in the Matrix where our hero Neo is on the run and he just grabs a phone off some bystander and is immediately able to cancel the existing call and dial a new one? That seemed totally believable at the time. I just wondered what the equivalent might be these days?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Database Tracks Laptops and Smart Phones

August 01, 2011 Added by:Headlines

The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Is Your Smartphone Safe From Mobile Hacking?

July 14, 2011 Added by:Headlines

“If I had money right now, I’d bet on the Russian mafia. Mobile hacking is going to be huge," said Steve Santorelli, director of global outreach at the Internet security research group Team Cymru...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Analysis of the Senate Hearings on Mobile Privacy

May 22, 2011 Added by:David Navetta

The rapid growth of mobile products and services raises several concerns: mobile devices are always on and always with the consumer, mobile devices contain information that is highly personal in nature, and companies have the ability to track consumers who use mobile devices...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: SMB's Lack Understanding of Mobile Security

May 20, 2011 Added by:Headlines

The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »