Blog Posts Tagged with "Smart Phone"

959779642e6e758563e80b5d83150a9f

Long Term Evolution of 3GPP – New Threats or Not?

March 08, 2011 Added by:Danny Lieberman

The security requirements for mobile networked devices are similar to traditional wired devices but the vulnerabilities are different, namely the potential of unmanaged BYOD tablet/smartphone to be an attack vector back into the enterprise network and to be a channel for data leakage...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Dealing With Daily Digital Surveillance

March 07, 2011 Added by:Robert Siciliano

"Step out your front door and you could be captured in a high-resolution photograph taken from the air or street by Google or Microsoft... Drive down a city thoroughfare, cross a toll bridge, or park at certain shopping malls and your license plate will be recorded and time-stamped...”

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Five Tips to Keep Your Android Phone Secure

March 04, 2011 Added by:Headlines

Whenever you download or update an app, you are given a list of permissions for that app. That alarm clock app you are looking at probably shouldn't need to be looking through your contacts. The general rule of thumb is if an app is asking for more than it does, you should probably skip it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nine Tips for Securing Mobile Devices When Traveling

March 03, 2011 Added by:Headlines

Logan Kugler writes about his experience with being "firesheeped" on a recent trip. Firesheep can harvest login credential on unencrypted Wi-Fi networks. He interviewed several information security experts to compile the following tips on locking down your mobile devices when traveling...

Comments  (0)

37d5f81e2277051bc17116221040d51c

mCrime Perfectly Positioned to Pounce in 2011

February 28, 2011 Added by:Robert Siciliano

The initial concerns involve rogue apps and phishing messages designed to extract credit card numbers and login credentials. As mCrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

More On Mobile Payments Security

February 25, 2011 Added by:PCI Guru

While iPhone is the “Big Kahuna”, it does not mean that Android and Windows Phone devices are not also used for credit card payments. Unfortunately, Android and Windows Phone devices have similar issues that make them difficult, if not impossible, to have PA-DSS certified applications...

Comments  (0)

Af2769c2480db78c589b811b428782b0

Are We Admitting Defeat on Mobile Security?

February 17, 2011 Added by:Lee Mangold

Never before has the attacker had the ability to listen to phone calls, read emails, read SMS messages, geo-locate, watch and listen in on conversations of the victim all at the same time. This is what you call pwnd...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

iPhone Hacked and Passwords Stolen in Six Minutes

February 12, 2011 Added by:Dan Dieterle

iPhone passwords may not be as secure as one might believe. According to German security researchers from the Fraunhofer Institute Secure Information Technology (Fraunhofer SIT), if you have physical access to the phone, passwords can be recovered from a locked Apple iPhone in six minutes...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Mobile Hacking Business Threats for 2011

February 11, 2011 Added by:Headlines

Mobile attacks are proving easier for criminals to employ with greater success rates as opposed to PC based attacks, and with the dramatic increase in the volume of mobile transactions, cyber criminals are quickly adapting by shifting their focus...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee: Mobile Malware Growth at All-Time High

February 08, 2011 Added by:Headlines

The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Feeling Like Somebody Is Watching You?

January 29, 2011 Added by:Theresa Payton

If you went to the airport, bank, or a store today, you probably expected to be watched. But those are the old school ways of being watched. Now, the smartphone in your pocket could watch you or your laptop webcam can watch you. Having an emotional reaction? There's a wristband monitor for that...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Six Hot New Hacks from Black Hat DC 2011

January 25, 2011 Added by:Headlines

Michael Gregg has assembled his picks for the top six hacks revealed at the Black Hat DC 2011 conference. Dozens of innovative threats were revealed at the conference last week, but Gregg describes these particular exploits as being the "six new hacks that will make your CSO cringe"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Breach May Have Exposed Millions of Client Accounts

January 24, 2011 Added by:Headlines

"Website owners should declare if they store your passwords using strong hashing. This is a simple process and not any more expensive to implement, however unfortunately websites not using this method of cryptography is something we see all too often..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Soundminer Trojan Listens for Credit Card Numbers

January 23, 2011 Added by:Headlines

"We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data. Our study shows that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attacking Computers and Smartphones via USB Cable

January 21, 2011 Added by:Headlines

Researchers have designed code which makes it possible to pilfer data when a smartphone is connected by USB cable with a computer. The code adds a mouse or keyboard function to the USB driver that allows the attacker to take control of the units and download files or upload malware...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Hack Makes Smartphones Mobile Spy Bugs

January 20, 2011 Added by:Headlines

Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »