Blog Posts Tagged with "Smart Phone"

69dafe8b58066478aea48f3d0f384820

Microsoft's Windows Phone 7 Sending Phantom Data

January 12, 2011 Added by:Headlines

Microsoft is looking in to reports that its Windows Phone 7 software is sending from mobile devices unexpectedly. Reports indicate the data transfers are relatively large, ranging from 2MB to 5MB in size per transfer, and some complaints have the totals levels as high as 30MB to 50MB per day...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Phishing for Mobile Users? They Are Taking the Bait

January 05, 2011 Added by:Katie Weaver-Johnson

It is critical for organizations to implement clearly defined policies for using mobile devices. It is also important that organizations continue to update their employees as risks, threats, requirements, etc. change on an ongoing basis. A once-a-year general training program is not enough...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Data Availability and Integrity – Apple-Microsoft Versions

December 29, 2010 Added by:Danny Lieberman

I have over 2,300 contacts on my iPhone and I wanted to backup them up. It appears that both Microsoft and Apple believe firmly that users should backup their iPhone contacts but they will never really want to restore the data...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Top Eight Security Threats for 2011

December 28, 2010 Added by:Headlines

McAfee Labs threat research Vice President Dmitri Alperovitch has outlined his top eight picks for the security threats to be aware of over the next year. "We are seeing an escalating threat landscape in 2011," said Alperovitch...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Information Security Trends to Watch for in 2011

December 23, 2010 Added by:Theresa Payton

2010 brought new and interesting things to do on the internet like the free game sensation “Angry Birds”…Wondering what 2011 might bring on the internet?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Billions of Dollars in Security Efforts Rendered Moot

November 17, 2010 Added by:Headlines

A report released by mobile technology vendor iPass reveals that nearly one quarter of employees surveyed admit that they regularly disregard security measures meant to protect sensitive data by accessing corporate networks on non-approved mobile communications devices...

Comments  (1)

520b811ebc3d9ab82bb52132109ceb7e

iPhone & Android Jailbreaking

November 14, 2010 Added by:Marnix van Meer

The latest jailbreak for the G2 uses a clever exploit in the NAND lock of the phone. The NAND lock makes the RAM memory read-only. The RAM memory does not have a genuine read only state, but the phone has a bootloader that can lock the NAND and makes the OS believe there is no memory available...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Over One Million Hit By Mobile Phone Malware

November 12, 2010 Added by:Headlines

This type of attack is particularly insidious, as victims are under the impression the messages are from trusted contacts, and many are unaware of the infection until they notice the dramatic increase in their usage charges...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Phone Security Under Attack

November 11, 2010 Added by:Robert Siciliano

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. As applications and other content are more widely distributed, security breaches will be inevitable...

Comments  (0)

7e6249b5c7f6b63c28587c820b16edcb

Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »