Wireless Security

69dafe8b58066478aea48f3d0f384820

Symantec's Analysis of the ZTE Android Backdoor Vulnerability

May 24, 2012 Added by:Headlines

"The worst-case scenario here is an attacker who tricks the user into installing a malicious application that takes advantage of this privilege escalation flaw. Once the application has full access to the device, the attacker can install, delete, monitor, and modify the device..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ZTE Confirms Backdoor Vulnerability in Android Devices

May 22, 2012 Added by:Headlines

"ZTE's Score M ships with an application featuring a hardcoded password that gives the user... administrator-level access. Running the program with the password spawns a root shell prompt on the Linux-powered mobes, allowing the phone to be completely taken over..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

DOJ: Any Protection is too Much for Cell Phone Tracking

May 08, 2012 Added by:Electronic Frontier Foundation

For years, we've been arguing that cell phone location data should only be accessible to law enforcement with a search warrant. After all, as web enabled smart phones become more prevalent, this location data reveals an incredibly revealing portrait of your every move...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Your New Best Friend May Not Protect You

May 05, 2012 Added by:Robert Siciliano

Your mobile phone may be your new best friend. Four out of seven people have mobile phones, because a phone really is a great companion that brings us into contact with people, media, music, and finances. But unlike a German Shepherd, your mobile isn’t a security device...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Three Areas to Test when Assessing Mobile Applications

May 02, 2012 Added by:Tom Eston

Mobile Application testing is something that will evolve as mobile apps get more complex and the business drives more towards mobile solutions. If you’re deploying mobile apps for your business it’s more important than ever to have testing done on three areas at a minimum....

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

On Cyber Threats in the Mobile Environment

April 20, 2012 Added by:Pierluigi Paganini

Mobile threats should alarm private industry, as the risk of data exposure is high due the growth of the mobile sector. Cyber criminals and governments are aware of the value of information to be gained from our mobile devices and are showing an increased interest in the sector...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Steve Lord at Black Hat EU 2012

April 10, 2012

Steve Lord, penetration tester extraordinaire and co-founder of 44Con, was at Black Hat Europe 2012 to talk about compromising MiFi (portable WiFi) devices to use for nefarious and not so nefarious purposes. But mainly for nefarious purposes (insert manic laughter)...

Comments  (1)

Bddc4983168ae96da4b83bdd01b51548

Pump Up Your P@$$w0rd$

April 03, 2012 Added by:Kevin Doel

The idea is to choose phrase that you will be able to remember and a simple algorithm for converting it to a strong password. Even the best encryption systems are not going to protect your data if you use weak passwords and a hacker gains physical access to your mobile device...

Comments  (2)

6ba13f7544750cd81809eb83d296112a

Do You Need a Formal Policy for Managing Mobile Devices?

March 28, 2012 Added by:Kyle Lagunas

Security risks associated with BYOD policies continue to intimidate some - one respondent said he is “scared to death of security vulnerabilities” - but what would do more to minimize risks than to adopt an official policy?

Comments  (0)

Bddc4983168ae96da4b83bdd01b51548

Shutting Front and Back Door Access to Your Mobile Devices

March 27, 2012 Added by:Kevin Doel

A lost or stolen phone constitutes a serious security threat to the information on the device because the attacker has unlimited time to gain access to the secrets that are stored therein. Important personal information should not be stored in any unsecured note application...

Comments  (0)

E973b16363b3de77b360563237df7e32

Seven Problems with Cell Phone Forensics

March 26, 2012 Added by:Bozidar Spirovski

Manufactures don’t always know how to retrieve data stored in new phones, so how do investigators do it? Staying up-to-date is challenging but not impossible. As criminals come up with new ways to abuse them, strangely enough, this can be beneficial for forensics...

Comments  (5)

7ddc1f3000a13e4dfec28074e9e7b658

Supreme Court Decision on GPS Surveillance Ripples

March 23, 2012 Added by:Electronic Frontier Foundation

The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wireless Security: Wi-Fi Hacking Burglars Get Busted

March 22, 2012 Added by:Robert Siciliano

Once a Wi-Fi network was located through wardriving, the hackers remotely watched for information that revealed the network’s security setup and vulnerabilities. Police said they used sophisticated electronic equipment to break through networks with WEP protection...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Nearly Five Percent of All Smartphones Lost Every Year

March 20, 2012 Added by:Robert Siciliano

Based on the costly consequences of lost data assets, it makes sense to allocate the necessary resources to invest in anti-theft and data protection solutions in order to secure smartphones and the sensitive and confidential information they contain...

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Top 5 Things Learned at the SANS Mobile Device Security Summit

March 19, 2012 Added by:Tom Eston

Having a lineup of great speakers really made the summit flow as well as it did. What I liked most about this event was that there were plenty of “real world” talks on how enterprises are setting up and managing mobile deployments…real “in the trenches” types of talks...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

NIST Guidance on Wireless Local Area Network Security

March 14, 2012

NIST has released a guide for enhanced security for wireless local area networks (WLAN) which provides recommendations on standardizing WLAN security configurations including configuration design, implementation, evaluation and maintenance and monitoring tools...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »