Blog Posts Tagged with "Smart Phone"


Significance of 'Death of the Document Web' to Security

January 18, 2012 Added by:Rafal Los

Infosec pros just started getting comfy with profiling, analyzing, and defending web-based apps from a server, consumed by a human, and used in a browser. Hang on tight because the world just took a sharp left and if you're not buckled in you're bound to be thrown from the bus...

Comments  (2)


That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)


Mobile Security: Android vs. iOS - An Infographic

January 12, 2012 Added by:Fergal Glynn

With the dominance of iOS and the rising popularity of Android devices in the mobile marketplace, the security of these devices is a growing concern. This infographic examines the security features of Android and iOS, and also takes a look at their strengths and weaknesses...

Comments  (1)


Don't Forget About E-Waste During the Holidays

December 27, 2011 Added by:Allan Pratt, MBA

How much time have you spent deciding what to do with the outdated smartphones, tablets, televisions, and computers? Don’t throw them out with the regular garbage. Instead, consider the environment, but first, take security precautions...

Comments  (0)


Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)


Android Apps Violate Permissions - But Who Cares, Right?

December 06, 2011 Added by:Ed Moyle

These guys built a tool called "woodpecker" that snakes around inside popular Android phone platforms looking for places where the phone is configured so as to violate the Android permission enforcement model. Go read it - you'd be surprised what they've found...

Comments  (0)


Android Facial Recognition Feature Defeated by Photo

November 14, 2011 Added by:Headlines

"It was safe to assume that Google wouldn't let its face-recognition technology be bypassed using a photo but this confirms it. Good news for those who were worried about their friends hacking their smartphone by using a Facebook profile photo or something similar..."

Comments  (1)


The Impact of Mobility on the SMB Workforce

November 04, 2011 Added by:Bill Gerneglia

Small and medium businesses are increasingly more mobile as their employees are demanding increased access from both the home and the road like never before. SMBs face a wide range of challenges when it comes to providing this access for these mobile workforces...

Comments  (0)


Mobile Malware and How to Defend Against It

October 05, 2011 Added by:Dan Dieterle

A lot was covered, including how hackers are creating apps that pass verification and are published in the app store, but when installed, pull down malicious updates. Bluetooth vulnerabilities and a “Truly Evil Hack” were also discussed...

Comments  (0)


Smartphones and Banking Application Security

September 22, 2011 Added by:Brent Huston

As device manufacturers continue to add processing power and storage capacity, and platform vendors provide more applications for generating and consuming data, security will become a greater concern as attackers look upon it as their new playground...

Comments  (2)


Five Security Considerations for a Mobile Phone

August 18, 2011 Added by:Robert Siciliano

Mobile users have recently captured the attention of cyber criminals. The Department of Homeland Security and the STOP. THINK. CONNECT. program recommends the following tips to help you protect yourself and to help keep the web a safer place for everyone...

Comments  (0)


Mobile Device Security: The Matrix in 2011

August 15, 2011 Added by:Simon Heron

Remember that scene in the Matrix where our hero Neo is on the run and he just grabs a phone off some bystander and is immediately able to cancel the existing call and dial a new one? That seemed totally believable at the time. I just wondered what the equivalent might be these days?

Comments  (0)


Microsoft Database Tracks Laptops and Smart Phones

August 01, 2011 Added by:Headlines

The data collected includes device MAC addresses and corresponding street addresses, which could be used to identify individual users in what amounts to clandestine tracking of customer movements. In fact, staff at Cnet were able to retrieve very specific device tracking information...

Comments  (0)


Is Your Smartphone Safe From Mobile Hacking?

July 14, 2011 Added by:Headlines

“If I had money right now, I’d bet on the Russian mafia. Mobile hacking is going to be huge," said Steve Santorelli, director of global outreach at the Internet security research group Team Cymru...

Comments  (2)


Analysis of the Senate Hearings on Mobile Privacy

May 22, 2011 Added by:David Navetta

The rapid growth of mobile products and services raises several concerns: mobile devices are always on and always with the consumer, mobile devices contain information that is highly personal in nature, and companies have the ability to track consumers who use mobile devices...

Comments  (0)


Symantec: SMB's Lack Understanding of Mobile Security

May 20, 2011 Added by:Headlines

The study also found that 23% of respondents believe allowing employees to use the mobile device of their choice has no significant impact on the overall security of the company's networks, while 52% believe that employee choice only decreases overall security somewhat...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »