Wireless Security

4ed54e31491e9fa2405e4714670ae31f

Steps Toward Weaponizing the Android Platform

May 13, 2013 Added by:Kyle Young

In this article I will be covering ways that one can turn their Android based device into a powerful pocket sized penetration testing tool.

Comments  (10)

8a958994958cdf24f0dc051edfe29462

Google: Black Hat or White Hat?

April 23, 2013 Added by:Larry Karisny

Google has a perfect opportunity to be a leader in cybersecurity. Google’s recent network -- and acquisitions and hires -- in Austin, Texas, is an opportunity to do security right the first time.

Comments  (1)

E85787adcaf7bca10e799cfd1cfd08f1

BYOD is Here to Stay. Take Device Lifecycle Into Account.

March 08, 2013 Added by:Michelle Drolet

t appears that BYOD, “Bring Your Own Device” to work, is beyond just being a growing trend if not currently a sanctioned practice within the corporate walls.

Comments  (1)

219bfe49c4e7e1a3760f307bfecb9954

Why HTC’s Settlement is a Game Changer for Secure Development

March 08, 2013 Added by:Rohit Sethi

The HTC settlement is not based on high-profile breaches. Instead, it points out: “HTC America failed to employ reasonable and appropriate security practices in the design and customization of the software on its mobile devices”.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Common Sense Cybersecurity

January 13, 2013 Added by:Larry Karisny

We start with one big problem. Internet architecture was never made for security. One of my earliest articles quoted the father of the Internet Vint Cerf by saying, "One of things incumbent on all of us is to introduce strong authentication into the fabric of the smart grid. We did not do that with the Internet."

Comments  (0)

65be44ae7088566069cc3bef454174a7

Are You Faking It?

January 06, 2013 Added by:Rebecca Herold

A few weeks ago I got a text message from a phone number I didn’t recognize, with a rather odd message. I sent a text back asking, “Who do U think U sent ur txt 2?” The response, “Myrtle!” I’m not Myrtle. Turns out they were using a phone number they had found online that was associated for the Myrtle they knew.

Comments  (0)

942a200514c2a9d79858ce6355c40614

Executive Viewpoint 2013: Avecto

December 29, 2012 Added by:Paul Kenyon

With technology now available that allows even a true administrator to log in with standard user rights and do their role without ever needing a privilege account, we will start to see more and more organizations adopt a least privilege approach to computing...

Comments  (1)

942a200514c2a9d79858ce6355c40614

Prediction: BYOD May Go Away in 2013

December 25, 2012 Added by:Paul Kenyon

Considering this speed of change, taking a moment to reflect on the security risks ahead is not only prudent, but could save your organization from being blindsided. From my view, here's what I'd recommend organizations, from SMBs to the enterprise, prepare for in 2013...

Comments  (4)

Af9c34417f8e5e0d240850bb353b5d40

Security is Inconvenient, Deal With It!

December 17, 2012 Added by:Keith Mendoza

ZD Net had an article entitled "Kernel vulnerability places Samsung devices at risk" and I thought "so, what's new" until I followed the link to the forum post on xda-developers. Then I just lost it because I'm certain that this is a result of plain and simple laziness...

Comments  (2)

E85787adcaf7bca10e799cfd1cfd08f1

Mobile Devices get means for Tamper-Evident Forensic Auditing

December 13, 2012 Added by:Michelle Drolet

In order to detect security breaches and guarantee compliance, tamper “proofing” has not been sufficient. When it comes time for a forensic audit, the ability to detect unauthorized changes to digital files becomes invaluable in an investigation...

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Weaponizing the Nokia N900 – Part 4.0 – A Three Year Anniversary!

November 25, 2012 Added by:Kyle Young

I still believe the best phone for hackers is the Nokia N900 and it is a shame that Nokia decided to go the way of Microsoft. I personally believe that Nokia should have gone the route of an Android/Linux hybrid mobile operating system, but that’s just my opinion...

Comments  (6)

68b48711426f3b082ab24e5746a66b36

Why You Should Care About Mobile Security: An Infographic

November 24, 2012 Added by:Fergal Glynn

No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security...

Comments  (2)

5a8300df8aa4169096932e433ec884b5

BYOD savings may be lost by security and admin costs

November 12, 2012 Added by:Rainer Enders

Companies need to mobilize, that is without question -- but for too long BYOD has become nearly synonymous with this effort. In reality, BYOD is just one of the ways enterprises can mobilize, and in many cases, it is not the most secure, or necessarily the most cost-efficient way to do so...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Digital Forensics for Handheld Devices

November 05, 2012 Added by:Ben Rothke

An iPhone 5 with 64 GB of storage and the Apple A6 system-on-a-chip processor has more raw computing power entire data centers had some years ago. With billions of handheld devices in use , it is imperative that forensics investigators know how to ensure that the data in them can be preserved...

Comments  (0)

5a8300df8aa4169096932e433ec884b5

Why doesn't your VPN work on the road?

October 29, 2012 Added by:Rainer Enders

With the ubiquity of mobile devices, staying securely connected to work - in theory - should require nothing more than an internet connection, and seemingly everywhere you travel, whether that be in hotels, airports, or conference trade shows, offer such connections. But the reality is more complicate...

Comments  (0)

5a8300df8aa4169096932e433ec884b5

The Undervalued Security Benefits of IPsec

October 26, 2012 Added by:Rainer Enders

For too long, IPsec struggled with a reputation of being cumbersome to implement and manage. However, even amid the harshest of its critics, its ability to secure data has rarely, if ever, come into question. Now, through advancements in the technology's infrastructure, IPsec has become easy to use...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »