Items Tagged with "Mobile Devices"


69dafe8b58066478aea48f3d0f384820

FBI Seeks Better Social Network Wire Tapping

February 21, 2011 Added by:Headlines

The advent of new media like social networks, new communications channels like IM, IRC, VoIP, and new devices like smartphones, have rendered current laws governing wire tapping outdated, and officials want lawmakers to narrow the gap by addressing the issue with new legislation...

Comments  (0)

Af2769c2480db78c589b811b428782b0

Are We Admitting Defeat on Mobile Security?

February 17, 2011 Added by:Lee Mangold

Never before has the attacker had the ability to listen to phone calls, read emails, read SMS messages, geo-locate, watch and listen in on conversations of the victim all at the same time. This is what you call pwnd...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mobile Hacking Business Threats for 2011

February 11, 2011 Added by:Headlines

Mobile attacks are proving easier for criminals to employ with greater success rates as opposed to PC based attacks, and with the dramatic increase in the volume of mobile transactions, cyber criminals are quickly adapting by shifting their focus...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee: Mobile Malware Growth at All-Time High

February 08, 2011 Added by:Headlines

The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...

Comments  (0)

65be44ae7088566069cc3bef454174a7

International Data Privacy Day: Top Five Privacy Predictions

January 24, 2011 Added by:Rebecca Herold

As electronic privacy becomes increasingly complex, it’s more crucial than ever that consumers and businesses understand their exposure and take steps to ensure their information is not compromised. January 28 is Data Privacy Day, as recognized by governments and technology leaders around the world...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee's Ten Tips for Securing New Devices in 2011

January 23, 2011 Added by:Robert Siciliano

Use software that backs up smart devices and use strong discretion when storing, saving or editing personal information on your smartphone or device. Don’t keep all of your personal passwords on your device, and avoid using it to store financial information like credit card and bank account numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Soundminer Trojan Listens for Credit Card Numbers

January 23, 2011 Added by:Headlines

"We implemented Soundminer on an Android phone and evaluated our technique using realistic phone conversation data. Our study shows that an individual's credit card number can be reliably identified and stealthily disclosed. Therefore, the threat of such an attack is real..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Hack Makes Smartphones Mobile Spy Bugs

January 20, 2011 Added by:Headlines

Ralf-Philipp Weinmann of the University of Luxembourg has identified an over-the-air attack that targets the GSM/3GPP stack enabling hackers to execute malicious code that can turn a smartphone into a mobile listening device...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Cybersecurity's 'Perfect Storm' Made Landfall

January 17, 2011 Added by:Headlines

Security expert Mandeep Khera warned that the next decade would see an escalation in cybercrime and the use of cyberwarfare tactics. In light of the rise of the Stuxnet, the Zeus Trojan and the shifting strategies employed by online criminals, Khera's predictions are worth a revisit...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee's Top Targets for Emerging Threats in 2011

January 17, 2011 Added by:Robert Siciliano

This is McAfee Labs list comprises 2010′s most buzzed about platforms and services, all of which are expected to be major targets for cybercriminals in the coming year...

Comments  (2)

D13f77e036666dbd8f93bf5895f47703

New Heist - Your Conversations and Text Messages

January 12, 2011 Added by:Theresa Payton

Two cybersecurity good-guy hackers worked on cell phone vulnerabilities for roughly a year designing ways to think like bad guys to see if they could steal text messages. They recently accomplished this feat and showed how they could steal text messages from any phone within 20 seconds...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Microsoft's Windows Phone 7 Sending Phantom Data

January 12, 2011 Added by:Headlines

Microsoft is looking in to reports that its Windows Phone 7 software is sending from mobile devices unexpectedly. Reports indicate the data transfers are relatively large, ranging from 2MB to 5MB in size per transfer, and some complaints have the totals levels as high as 30MB to 50MB per day...

Comments  (0)

Dd9902bc56a9d85cdc62c00083ea4871

Phishing for Mobile Users? They Are Taking the Bait

January 05, 2011 Added by:Katie Weaver-Johnson

It is critical for organizations to implement clearly defined policies for using mobile devices. It is also important that organizations continue to update their employees as risks, threats, requirements, etc. change on an ongoing basis. A once-a-year general training program is not enough...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

PCI SSC Backs Off Certifying Mobile Payment Apps

January 05, 2011 Added by:PCI Guru

A mobile payment refers to the use of a wireless device as a cash register. This is one of the reasons why the PCI SSC has pulled back on certifying mobile payment applications. The definition is becoming too broad and confusing thus creating too many issues to cover in a quick time...

Comments  (0)

E973b16363b3de77b360563237df7e32

The Value of a Stolen Corporate Laptop

January 04, 2011 Added by:Bozidar Spirovski

There are a lot of companies who do not take this issue seriously. The mindset of managers still needs to be adjusted to present the issue. Because managers speak the language of money, let's make a simple calculation that shows the impact of how much is your laptop worth...

Comments  (2)

B64e021126c832bb29ec9fa988155eaf

Android Trojan Most Sophisticated Ever Found

January 03, 2011 Added by:Dan Dieterle

Geinimi is capable of receiving commands from remote servers controlled by hackers, this botnet-style functionality together with the use of code obfuscation techniques leads mobile security firm Lookout to describe the malware as the most sophisticated to appear on Android devices to date...

Comments  (0)

Page « < 11 - 12 - 13 - 14 - 15 > »