Blog Posts Tagged with "Smart Phone"
Microsoft's Windows Phone 7 Sending Phantom Data
January 12, 2011 Added by:Headlines
Microsoft is looking in to reports that its Windows Phone 7 software is sending from mobile devices unexpectedly. Reports indicate the data transfers are relatively large, ranging from 2MB to 5MB in size per transfer, and some complaints have the totals levels as high as 30MB to 50MB per day...
Comments (0)
Phishing for Mobile Users? They Are Taking the Bait
January 05, 2011 Added by:Katie Weaver-Johnson
It is critical for organizations to implement clearly defined policies for using mobile devices. It is also important that organizations continue to update their employees as risks, threats, requirements, etc. change on an ongoing basis. A once-a-year general training program is not enough...
Comments (0)
Data Availability and Integrity – Apple-Microsoft Versions
December 29, 2010 Added by:Danny Lieberman
I have over 2,300 contacts on my iPhone and I wanted to backup them up. It appears that both Microsoft and Apple believe firmly that users should backup their iPhone contacts but they will never really want to restore the data...
Comments (2)
Top Eight Security Threats for 2011
December 28, 2010 Added by:Headlines
McAfee Labs threat research Vice President Dmitri Alperovitch has outlined his top eight picks for the security threats to be aware of over the next year. "We are seeing an escalating threat landscape in 2011," said Alperovitch...
Comments (0)
Information Security Trends to Watch for in 2011
December 23, 2010 Added by:Theresa Payton
2010 brought new and interesting things to do on the internet like the free game sensation “Angry Birds”…Wondering what 2011 might bring on the internet?
Comments (0)
Billions of Dollars in Security Efforts Rendered Moot
November 17, 2010 Added by:Headlines
A report released by mobile technology vendor iPass reveals that nearly one quarter of employees surveyed admit that they regularly disregard security measures meant to protect sensitive data by accessing corporate networks on non-approved mobile communications devices...
Comments (1)
iPhone & Android Jailbreaking
November 14, 2010 Added by:Marnix van Meer
The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...
Comments (0)
Over One Million Hit By Mobile Phone Malware
November 12, 2010 Added by:Headlines
This type of attack is particularly insidious, as victims are under the impression the messages are from trusted contacts, and many are unaware of the infection until they notice the dramatic increase in their usage charges...
Comments (0)
Mobile Phone Security Under Attack
November 11, 2010 Added by:Robert Siciliano
As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. As applications and other content are more widely distributed, security breaches will be inevitable...
Comments (0)
Reconnaissance Gone Retail and Security - A Challenging Duality
November 03, 2010 Added by:Robert Gezelter
A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...
Comments (0)
- Cloud Security Alliance Shares Security Guidance for Crypto-Assets Exchange
- Intel Corp. to Speak at SecurityWeek Supply Chain Security Summit
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption