Items Tagged with "Mobile Devices"


0c4ca84ec3f3f2d57194f8e0cbd5ba85

Companies Need to be Proactive About Corporate Security

March 16, 2011 Added by:Lindsay Walker

Managing and monitoring corporate security requires a strong commitment from everyone in an organization. Systems need to be updated regularly, IT personnel need to stay up to date on new security trends and employees require ongoing training to ensure they are doing their part to help out...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Cross-Site Scripting in the Wild Exploiting Your Droid

March 16, 2011 Added by:Rafal Los

You've got mobile devices now like the iPhone, the 'Droids, the RIM devices, Windows7 handsets and of course WebOS-based devices too. Guess where all the 'apps' and updates come from? Guess what the #1 used transport protocol is on those devices? HTTP...

Comments  (0)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit in Washington, D.C.

March 15, 2011 Added by:Ben Zvaifler

The Cyber Security Strategies Summit will focus on education, the key to navigating the security landscape in a world of uncertainty. Whether you are managing new initiatives, implementing new programs or designing new technologies, being informed is the deciding factor in winning the cyber war...

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

There's an App for That

March 15, 2011 Added by:Ron Baklarz

The App Genome Project was created as an ongoing effort to provide insight into mobile market dynamics, gain insight into how mobile apps access personal data and sensitive capabilities on mobile devices, and identify security threats in the wild...

Comments  (0)

485f5553442ebdfbfa4926166697c319

Enforcing Authentication on Employee Smartphones

March 14, 2011 Added by:Roman Yudkin

As employees continue to use their smartphones for both personal and business purposes, businesses must begin implementing stringent security measures and educating their employees on the importance of protecting the mobile devices and specific applications with layers of authentication...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Long Term Evolution of 3GPP – New Threats or Not?

March 08, 2011 Added by:Danny Lieberman

The security requirements for mobile networked devices are similar to traditional wired devices but the vulnerabilities are different, namely the potential of unmanaged BYOD tablet/smartphone to be an attack vector back into the enterprise network and to be a channel for data leakage...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Zeus Trojan Migrates to Blackberry OS

March 07, 2011 Added by:Headlines

The malware allows remote access of infected Blackberry devices by the attacker, who can then change the SMS message default number, add a new device administrator, control blocked call lists, and even turn the device on and off...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Five Tips to Keep Your Android Phone Secure

March 04, 2011 Added by:Headlines

Whenever you download or update an app, you are given a list of permissions for that app. That alarm clock app you are looking at probably shouldn't need to be looking through your contacts. The general rule of thumb is if an app is asking for more than it does, you should probably skip it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nine Tips for Securing Mobile Devices When Traveling

March 03, 2011 Added by:Headlines

Logan Kugler writes about his experience with being "firesheeped" on a recent trip. Firesheep can harvest login credential on unencrypted Wi-Fi networks. He interviewed several information security experts to compile the following tips on locking down your mobile devices when traveling...

Comments  (0)

84e08063452899ef6bda9d1e459bcdcd

Cyber Security Strategies Summit

February 28, 2011 Added by:Ben Zvaifler

Geared towards enterprise and government security officers, the Cyber Security Strategies Summit presents case studies that will build on your knowledge of the industry as well as open your eyes to changes and innovations in the space. Topics being covered will include...

Comments  (0)

37d5f81e2277051bc17116221040d51c

mCrime Perfectly Positioned to Pounce in 2011

February 28, 2011 Added by:Robert Siciliano

The initial concerns involve rogue apps and phishing messages designed to extract credit card numbers and login credentials. As mCrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Five Security Threats to Monitor

February 25, 2011 Added by:Headlines

One of the biggest problems Khan notes is the inability of targeted entities to produce accurate information pertaining to attack attribution, citing a report by the ITRC which stated that out of the 662 registered breaches, forty percent of targets could not identify the origin of the attacks...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

More On Mobile Payments Security

February 25, 2011 Added by:PCI Guru

While iPhone is the “Big Kahuna”, it does not mean that Android and Windows Phone devices are not also used for credit card payments. Unfortunately, Android and Windows Phone devices have similar issues that make them difficult, if not impossible, to have PA-DSS certified applications...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Research Roundup: ThreatPost Security Spotlight Report

February 24, 2011 Added by:Mike Meikle

The ThreatPost report outlines concerns over the complexity of smartphones, lack of basic email encryption regimens, and the unknown impact of third-party applications on the hardware lead to a changing and more threatening security landscape for 2011...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Mobile Device Security Challenges

February 23, 2011 Added by:Danny Lieberman

Deploying line of business or life science applications on mobile Android tablets or an iPad has a different set of security requirements than backing up your address book. It requires thinking about the software security and privacy vulnerabilities in a systematic way...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Mobile Apps Vulnerable to Malicious Bypass Code

February 21, 2011 Added by:Headlines

The ongoing assumption has been that applications offered in the app marketplace have been vetted for security, but McAfee researchers have evidence that some mobile applications that have been approved for distribution may not be as secure as consumers would expect...

Comments  (1)

Page « < 10 - 11 - 12 - 13 - 14 > »