Wireless Security

0a8cae998f9c51e3b3c0ccbaddf521aa

BYOD: Challenges of Protecting Data - Part Two

August 01, 2012 Added by:Rafal Los

Productivity is nice to talk about when you can sit at home and read your corporate email on your tablet, or mobile phone - but what if that device is ridden with malware, or hijacked to be part of a botnet, there are very serious security and productivity implications there. Let's expand on this a bit...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Does Jailbreaking or Rooting Affect Mobile Device Security?

August 01, 2012 Added by:Robert Siciliano

By hacking your device, you can potentially open security holes that may have not been readily apparent, or undermine the device’s built-in security measures. Jailbroken and rooted phones are much more susceptible to viruses and malware...

Comments  (0)

942fc2242e6b54c078c5bb19c9fbf154

Five Security Tips for Android Phones and Tablets

July 31, 2012 Added by:Nicholas Cifranic

Android app stores such as Google Play have little or no security implementation, so anyone with a developer account may publish applications. Although Google has been attempting to enforce more controls to detect malicious apps, hackers are still publishing malware disguised as popular applications...

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Visualize Wi-Fi Networks Using Vistumbler and Google Earth

July 30, 2012 Added by:Dale Rapp

Vistumbler is an excellent free tool that scans for nearby wireless networks within range of your wi-fi adapter. Once Vistumbler finds a wireless network it will display the networks SSID, signal strength, encryption being used, mac address, the networks channel, access point manufacturer, and much more...

Comments  (4)

0a8cae998f9c51e3b3c0ccbaddf521aa

BYOD: Challenges of Protecting Data - Part One

July 30, 2012 Added by:Rafal Los

Whether we're talking about cloud computing, or BYOD, or hacking in general - the buck stops with data. Some believe you can't ever classify all of your data and you should move on, while others believe that without making data custodians responsible for classification of critical data nothing else can happen...

Comments  (1)

7c5c876d1933023ac375eead04302e1a

BYOD too Big for Twitter...

July 29, 2012 Added by:Boris Sverdlik

It's not a question of technology, it really isn't. The one problem that we keep running into is that user's don't want us installing things on their personal devices. It's the whole entitlement mentality that our users have somehow attained through all of our babying. That's the cost of using their resources...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

NSA Seeks Solutions for Secure Mobile Capabilities

July 23, 2012 Added by:Headlines

“First and foremost, our whole strategy from a classified mobility perspective is very much focused on commercial solutions for classified [communications]... It’s our intent that we would deliver, end-to-end, a solution that is reliant on all commercial components and we believe we can do that...”

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Security is Your Responsibility When Using Free Wi-Fi

July 17, 2012 Added by:Dale Rapp

Free wireless hot spots deliver a high-speed internet connection, but this convenient no hassle access to the internet comes with a lack of security. This doesn't mean you should avoid accessing a free wireless hot spot, it just means you need to be aware of how to protect your device when you do...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

NIST Guidelines for Securing Mobile Devices in the Enterprise

July 11, 2012

The purpose of this publication is to help organizations centrally manage and secure mobile devices against a variety of threats. This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Navigating the Minefield of Mobile Technology Purchasing

July 10, 2012 Added by:Patrick Oliver Graf

In organizations, there is a constant struggle between satisfying the technological needs of workers while maintaining an adherence to compliance and security. Remote access represents the next major iteration of this battle. This complexity also means there’s far more overlap between the pain points...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

FCC Seeks Public Comment on Mobile Data Collection Policies

July 10, 2012 Added by:David Navetta

The FCC revived an inquiry first launched in 2007 to investigate telecom carriers’ practices regarding the privacy and security of information stored on mobile communications devices, prompted by the recent controversy in which software installed on mobile phones was shown to be collecting data from customers...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Law Enforcement Sought 1.3 Million Cell Phone Records in 2011

July 09, 2012 Added by:Headlines

“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Is Your WPA2 Protected Wireless Network Really Secure

July 01, 2012 Added by:Dale Rapp

A weak WPA2 passphrase could be hacked allowing an unauthorized person to use the wireless network. Even worse this unauthorized person could decrypt the communications revealing emails you send, web sites you visit, and passwords you use for access to websites...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Do I Protect Myself When Using Wi-Fi?

June 28, 2012 Added by:Robert Siciliano

Today, with criminal hackers as sophisticated as ever, if you are using an open unsecured network on your mobile device, you risk exposing your data. There are many ways for hackers to see who’s connected on a wireless connection, and to gain access to your information...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Save Your Photos from a BYOD Security Policy

June 24, 2012 Added by:Brent Huston

One of the more common rules is to enable the remote wipe and lock feature. This means that if your device was ever stolen or compromised, the IT department can remotely lock the device and then wipe any data from it. And yes, that would include all of your photos as well as other items...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The DOD's Mobility Device Strategy Released

June 20, 2012

“This strategy is not simply about embracing the newest technology - it is about keeping the DoD workforce relevant in an era when information and cyberspace play a critical role in mission success," said Teri Takai, Department of Defense chief information officer...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »
Most Liked