Wireless / Mobile Security — News

IT security's scariest acronym: BYOD, bring your own device

The torrent of <a href="http://www.networkworld.com/news/2011/061511-smartphones-tablets-security.html">smartphones and tablets entering companies</a> has created some interesting challenges for security managers. The new devices introduce new operating systems, new development environments and <a href="http://www.networkworld.com/news/2011/022811-smartphones-security.html">new security risks</a>, but no new control. The scariest acronym in security might well be "BYOD," or "bring your own device." As companies develop security and mobility strategies to deal with these devices, it is worth bearing in mind the lessons learned from managing laptops. But it is also worth applying some of the new lessons from smartphones on the laptops, too!

Andreas M. Antonopoulos | 28 Jul | Read more

Social engineering: 3 mobile malware techniques

Social engineers have been using various <a href="http://www.csoonline.com/article/480589/9-dirty-tricks-social-engineers-favorite-pick-up-lines">dirty tricks</a> to fool people for centuries. <a href="http://www.csoonline.com/article/596512/social-engineering-techniques-4-ways-criminal-outsiders-get-inside">Social engineering</a>, the art of <a href="http://www.csoonline.com/article/494464/social-engineering-5-security-holes-at-the-office-includes-video-">gaining access to buildings</a>, systems or data by exploiting <a href="http://www.csoonline.com/article/663329/social-engineering-3-examples-of-human-hacking">human psychology</a>, rather than by breaking in or using technical hacking techniques, is as old as crime itself and has been used in many ways for decades.

Joan Goodchild | 26 Jul | Read more

Banking Trojan hits Android phones

A banking Trojan that has plagued Symbian, BlackBerry and <a href="http://www.networkworld.com/topics/windows.html">Windows</a> Phone users has now made its way to <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> devices.

Brad Reed | 15 Jul | Read more

"Depraved" Wi-Fi hacker gets 18 years in prison

A Minnesota man has been sentenced to 18 years in prison after he hacked a neighbor's Wi-Fi <a href="http://www.networkworld.com/news/2009/120909-network-router-cheat-sheet.html?ts0hb&amp;story=rtrcheat">router</a> and then launched a vengeful two-year campaign to frame them with child pornography and threats to government officials, including Vice President Joe Biden.

John Cox | 14 Jul | Read more

Google Voice Spam Filter Blocks Unwanted Calls

A new feature from Google for Google Voice takes the power of the "Report Spam" button and multiplies it exponentially. Google is applying the collected data from thousands of <a href="http://www.pcworld.com/businesscenter/article/204220/gmail_voice_promises_affordable_calling.html">Google Voice users</a> to automatically identify telemarketers and other unwanted calls and send them directly into the spam folder.

Tony Bradley | 14 Jul | Read more

Consumer device use grows, but IT and security can't keep up

IT and security managers are slowly embracing the growing number of <a href="http://www.csoonline.com/article/618163/how-to-adopt-consumer-tech-for-efficiency">consumer devices</a>, such as iPhones and <a href="http://m.csoonline.com/article/686040/iphone-and-ipad-security-4-tips-to-stay-safe">iPads</a>, that are being used by workers within their organizations, but many enterprises are still overwhelmed by the need to mitigate risk and support the devices. That is the finding of new research released Tuesday by Unisys Corporation. The study was conducted for Unisys by International Data Corp.

Joan Goodchild | 13 Jul | Read more

Lulzsec: the rise and fall of a hacking collective

The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world. In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.

Liam Tung | 12 Jul | Read more