Wireless Security

E313765e3bec84b2852c1c758f7244b6

Mobile Banking Application Development

June 22, 2010 Added by:Brent Huston

Lately, we have been looking at a lot of banking apps and front ends for the iPhone, Android and other mobile devices in the lab. Our testing thus far has shown some great results and it seems like a lot of banks, credit unions and other financial institutions are interested in having an “app” for their customers and members.

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Secure is your Mobile Phone?

June 11, 2010 Added by:Robert Siciliano

I love my iPhone. The fact that I have a full web browser and can access all my data anytime from anywhere is fantastic. Plus my iPhone allows me to peek in on my home security system with an application that’s connected to my home security cameras. If I’m on the road I can log in and see the family doing whatever activities in our outside the home.

Comments  (4)

85ac6feb584b665e85664974c546cfec

Google was capturing your wireless packets

May 18, 2010 Added by:Ray Tan

Last month the German government decided that it needed to take a closer look into Google's data collection methods. Google's Street View cars are equipped with wireless antenna's and pick up any available wireless signal along the way. It was originally thought that the Street view cars were just collecting SSID and MAC address to provide location based services to mobile users. It turns out that...

Comments  (13)

1f2f664e68a603b3c54890fbbcd37857

Google Privacy

May 17, 2010 Added by:Mark Gardner

In a post to their official blog on Friday 14th May 2010 , Google announced that they had been “mistakenly collecting samples of payload data from open (i.e. non-password-protected) WiFi networks.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Mobile Phone Becoming Bigger Target For Hackers

May 14, 2010 Added by:Robert Siciliano

Mobile Internet access and mobile service usage is growing rapidly and cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for innovation created by application developers and other content creators who are increasingly demanding more device access. As their requests grow in numbers and they distribute their products more widely, security breache...

Comments  (0)

6d117b57d55f63febe392e40a478011f

An Interview with U.N. Cybersecurity Expert Raoul Chiesa

April 15, 2010 Added by:Anthony M. Freed

I recently had the pleasure of talking with Raoul Chiesa, OPST, OPSA, and ISECOM Trainer, about international perspectives on cybersecurity issues. Mr. Chiesa is a Senior Advisor on Strategic Alliances & Cybercrime Issues at the Global Crimes Unit for the United Nations Interregional Crime & Justice Research Institute, a Member of the Permanent Stakeholders Group at the European Network &a...

Comments  (0)


From the Web

Code That Protects Most Cellphone Calls Is Divulged

December 28, 2009 from: Office of Inadequate Security

A German computer engineer said Monday that he had deciphered and published the secret code used to encrypt most of the world’s digital mobile phone calls, in what he called an attempt to expose weaknesses in the security of the world’s wireless systems.

Comments  (0)


From the Web

Cloud Based Wireless Cracking Services

December 15, 2009 from: AEON Security Blog

Security researchers are leveraging cloud computing to crack WPA wireless passwords at a cost and we’re wondering what other nefarious deeds are being done via cloud computing that we’ve never heard about. To be fair about this, for starters if you take notice of PC World’s title for the article, “New Cloud-based Service Steals Wi-Fi Passwords” it’s completely w...

Comments  (0)

Abceedf5017915685f379075f00a5ccd

Squinting at Cloud Formations

October 12, 2009 Added by:Sudha Nagaraj

The problem with the cloud is that it can evaporate leaving no trace behind! The weekend thunderbolt that hit over a million subscribers of T-Mobile Sidekick, operated by the Microsoft subsidiary, Danger Inc in the US, is standing testimony to the whimsical nature of cloud computing.

Comments  (0)

C7159a557369b66632c4b54bf746b69e

Vishing scams are making a return

October 11, 2009 Added by:Sean Inman

On Friday 10/09/2009 it was reported in a ISC Diary update a new Vishing scheme is making its way across AT&T, Sprint and T-Mobiles networks.  Vishing is the cousin of Phishing, but this latest attempt indicates that its still a practical method of attack.  The recent attack starts with a text message that reports a problem with the victims account. They’re instructed to dial a...

Comments  (0)

Abceedf5017915685f379075f00a5ccd

Are the days numbered for Chinese handsets in India?

October 09, 2009 Added by:Sudha Nagaraj

In a country with over 400 million mobile phones in use where ten million new phones are being sold every month, a security scare over cheap and illegal handsets imported from China, threatens to silence over 25 million handsets by end November.

Comments  (0)

Abceedf5017915685f379075f00a5ccd

The Devil in the Downloads

October 08, 2009 Added by:Sudha Nagaraj

Just when the Blackberry has moved over to the consumer segment from the business user segment, a host of security issues plague smartphones. With competition gearing up among smartphone makers, the stress is on innovative applications to drive sales.

Comments  (0)


From the Web

8 indicted in $22m fraud against AT&T Wireless, T-Mobile

August 19, 2009 from: Office of Inadequate Security

An indictment was unsealed in Brooklyn federal court this morning charging Courtney Beckford, Gabe Beizem, Rawl Davis, Lennox Lambert, Marsha Montayne, Saul Serrano, Ron Shealey, and Rohan Stewart, with conspiracy to commit mail fraud and wire fraud. Beizem, Montayne, and Stewart were also charged with wire fraud and aggravated identity theft.

Comments  (0)

Page « < 14 - 15 - 16 - 17 - 18 > »