Wireless Security

0403c88fd155b90c9d994434a8360e67

Paving the Road to Digital Transformation

August 18, 2016 Added by:Jackson Shaw

Digital transformation has arrived and organizations are embracing the latest innovations to provide customers with anytime, anywhere, any way access.

Comments  (0)

564d3c4d8288860c70049e09a49d1ae1

A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

7d55c20d433dd60022642d3ab77b8efb

SAP Afaria: How to Wipe Mobile Devices Clean with One Text Message

February 11, 2016 Added by:Alexander Polyakov

SAP Afaria can be used for remote control of mobile devices and, with ClientID generated on the basis of IMEI, attackers can compromise devices via text messages if they know the victim's phone number and IMEI.

Comments  (0)

69fd9498e442aafd4eb04dfdfdf245c6

The Age of Advanced Threats Has Arrived

January 15, 2016 Added by:Luis Corrons

The most capable defense solutions must not only be centralized, but also be able to automatically block, identify, forensically profile and purge malware, even when it is veiled by legitimate programs and processes. The software needs to be smarter than the malware itself.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Carrier Grade NAT and the DoS Consequences

December 16, 2015 Added by:Stefan Fouant

Through the use of dedicated DDoS mitigation devices, Carrier Grade NAT devices and their associated customers are protected from service disruptions, while still ensuring legitimate traffic is allowed unencumbered.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Managing Security Resources: It’s All About People and Awareness (Part II)

December 07, 2015 Added by:Steve Durbin

As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Hackers and Threats: Cybercrime Syndicates Go Global

August 04, 2015 Added by:Steve Durbin

Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part III)

July 06, 2015 Added by:Steve Durbin

Part III in this series looks at the need to institute a cloud assessment process and the four actions that organizations of all sizes can take to better prepare themselves as they place their sensitive data in the cloud.

Comments  (0)

0ead717779244d9aab5c1699308850d2

Researchers Demonstrate Stealing Encryption Keys Via Radio

June 24, 2015 Added by:Brian Prince

Researchers at Tel Aviv University have demonstrated a method of stealing encryption keys from a PC using a radio receiver small enough to hide inside a piece of pita bread.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part II)

June 22, 2015 Added by:Steve Durbin

Cyber resilience has never been more important than it is today. As everything from supply chain management to customer engagement shifts to the cloud, operating in cyberspace now has bottom line implications if systems are disrupted. Cyber cloud resilience requires a balanced approach that protects both organizations and individuals while also enabling open, safe commerce and communication.

Comments  (0)

D36d0936f0c839be7bf2b20d59eaa76d

Cloud Security: It’s in the Cloud - But Where? (Part I)

June 15, 2015 Added by:Steve Durbin

Organizations are becoming increasingly dependent on their use of cloud services for business benefit both internally and when working with third party suppliers across multiple jurisdictions. However, while these services can be implemented quickly and easily, organizations need to have a clearer understanding of where their information is stored and how reliable these services are.

Comments  (0)

6d117b57d55f63febe392e40a478011f

Researchers Track Subway Rider’s Movements Through Mobile Phones

June 09, 2015 Added by:Anthony M. Freed

A team of Chinese researchers say they have devised a methodology to track the movements of subway riders through motion detectors that are standard features on most mobile phones.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked