Blog Posts Tagged with "Mobile Devices"

F520f65cba281c31e29c857faa651872

Mobile Providers Must Tap Customer Knowledge

December 25, 2010 Added by:Rahul Neel Mani

Mobile services providers need to build on their intimate knowledge of their customers to differentiate themselves and create compelling, affordable packages, or risk losing customers and revenue...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Intel Processor Chips Now 3G "Kill Switch" Enabled

December 21, 2010 Added by:Headlines

SMS kill-switch enabled devices may be vulnerable to unauthorized data deletion or susceptible to being disabled if the systems regulating the mechanism are breached by hackers or by way of an insider threat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Lost Laptops Costing Businesses Billions of Dollars

December 03, 2010 Added by:Headlines

The Study found that more than 80,000 laptops had gone missing from just over 300 companies in the course of a year, with a $50,000 price tag associated with each lost unit. The total cost was over two billion dollars, an average of almost six and a half million dollars per company...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Digital Certificates and Mobile Malware Top Threat List

November 23, 2010 Added by:Headlines

Stolen digital certificates and malware infested applications aimed at the growing smartphone and tablet markets top the eight biggest threats for 2011. The frequency of encounters with cyber miscreants may be on the rise as well with the proliferation of Malware as a Service...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Billions of Dollars in Security Efforts Rendered Moot

November 17, 2010 Added by:Headlines

A report released by mobile technology vendor iPass reveals that nearly one quarter of employees surveyed admit that they regularly disregard security measures meant to protect sensitive data by accessing corporate networks on non-approved mobile communications devices...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Imperva Releases Top 10 Security Threats for 2011

November 15, 2010 Added by:Headlines

The predictions for the top ten information security trends expected in 2011, compiled by Imperva’s Application Defense Center, are based on analysis of incident and vulnerability data from the past year as well as findings from the company’s Hacker Intelligence Initiative...

Comments  (0)

520b811ebc3d9ab82bb52132109ceb7e

iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Protecting Against Mobile Computing Risks

October 31, 2010 Added by:Allan Pratt, MBA

With all the hoopla about mobile computing, everyone knows the basic concerns. There are the geographical concerns, the financial concerns, the information security concerns, and, of course, there is the physical security issues...

Comments  (0)

65be44ae7088566069cc3bef454174a7

Reining In Enterprise Mobile Computing Risks

October 07, 2010 Added by:Rebecca Herold

As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information. It is vital that an effective mobile computing device and storage media security and privacy management program is in place...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Supreme Court: You Can Spy on Employees if...

July 08, 2010 Added by:Katie Weaver-Johnson

After several lower court rulings, the Supreme Court ruled that because the employers suspected that people were breaking the rules and using their mobile devices and pagers for non-business communications, the employers were justified in requesting and reading the text message transcripts...

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Mobile Banking Application Development

June 22, 2010 Added by:Brent Huston

Lately, we have been looking at a lot of banking apps and front ends for the iPhone, Android and other mobile devices in the lab. Our testing thus far has shown some great results and it seems like a lot of banks, credit unions and other financial institutions are interested in having an “app” for their customers and members.

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Secure is your Mobile Phone?

June 11, 2010 Added by:Robert Siciliano

I love my iPhone. The fact that I have a full web browser and can access all my data anytime from anywhere is fantastic. Plus my iPhone allows me to peek in on my home security system with an application that’s connected to my home security cameras. If I’m on the road I can log in and see the family doing whatever activities in our outside the home.

Comments  (4)

37d5f81e2277051bc17116221040d51c

Is That Portable Device a Data Hazard?

April 06, 2010 Added by:Robert Siciliano

According to a survey  of London and New York City taxi companies last year revealed that more than 12,500 devices, such as laptops, iPods and memory sticks, are forgotten in taxis every six months. Portable devices that may have troves of sensitive data.

Comments  (1)

Page « < 10 - 11 - 12 - 13 - 14 > »