×
We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.

Mobile Security - Article Archives - Page 39

WiFi Security Concerns Easing

November 03, 2004 |
For corporate deployment of WiFi networks, security has been the biggest hurdle to overcome and one of WiFi's biggest cons. Today, all that has changed.
READ MORE

Giving Network Demons the Boot

October 22, 2004 |
Can corporate IT administrators learn a lesson from two colleges that stopped virus attacks in their tracks?
READ MORE

CREDANT, Cranite Partner to Create Certified Security for Extended WLANs

October 19, 2004 |
Combining expertise in enterprise WLAN security and protection for mobile wireless computing devices, the alliance also complies with existing governmental standards for security and privacy.
READ MORE

RIM Refutes BlackBerry Buffer Overflow Claim

October 15, 2004 |
RIM gets security researcher to update their claims about previously identified issue.
READ MORE

Epok Targets Web Services Security

October 08, 2004 |
The firm launches an enhanced platform aimed at wireless carriers and the government sector.
READ MORE

Security Fears Still Blocking WLAN Adoption

September 21, 2004 |
A new report says that even though security issues are being addressed, they continue to be the main thing preventing enterprises from going wireless.
READ MORE

LucidLink Announces Security Upgrade

September 15, 2004 |
The relatively new software, which makes security simple for SMBs, is already getting a customer-demanded update to support more access points and to plug a potential hole.
READ MORE

Working Together for More Secure Software

September 07, 2004 |
eSecurityPlanet's columnist Ken van Wyk takes a look at Software Security, a new discipline that calls for security concerns to be considered throughout design, testing, implementation and deployment. van Wyk says it's the only way to truly have secure software.
READ MORE

Spam, DoS Headed VoIP's Way

August 23, 2004 |
Spam over Internet Telephony (SPIT) and DoS attacks could make IP telephony as vulnerable as e-mail.
READ MORE

Wi-Foo Author on Unsecured Wireless Networks

August 20, 2004 |
One of the authors of the new book Wi-Foo: The Secrets of Wireless Hacking talks exclusively to eSecurityPlanet about just how unsecure most networks are and what needs to be done about it.
READ MORE

With Wireless, Easy Road is Riskiest Path

August 16, 2004 |
When it comes to a wireless connection at home, convenience and ease-of-installment could lead you to an unsafe set up. eSecurityPlanet columnist Bob Hillery walks you through a safer connection -- for you and your corporate laptop.
READ MORE

Mosquito Trojan Bites Developer Back

August 13, 2004 |
In an attempt to copy protect its game Mosquito, Ojum embedded a Trojan Horse, uncovered this week by a number of anti-virus vendors. The Trojan dialer, however, not only affected illegitimate users of the game, but rightful players as well.
READ MORE

Trojan Horse Attacking SmartPhones

August 11, 2004 |
Unlike last week's malware, which targeted Pocket PCs, this week's malicious code hit Symbian smartphones running an illegal version of the game Mosquitoes.
READ MORE

Microsoft Office Upgrade Tackles Spam

July 27, 2004 |
The software giant targets spam in an Office 2003 upgrade and reworks two other components.
READ MORE

Security is in Wi-Fi Management's Future

July 20, 2004 |
Established WLAN management systems are getting more protection features -- and many vendors are changing their focus entirely toward security, because that's where the money is.
READ MORE

Too Many Lost Emails Leave us Unconnected

July 19, 2004 |
eSecurityPlanet's Ray Everett-Church is sick and tired of having his emails lost. With all of our technology, shouldn't this be the ''golden age'' of email? Sadly, it's not.
READ MORE

802.11i Security Specification Finalized

June 25, 2004 |
UPDATED: The long awaited standard for Wi-Fi-based LANs has been ratified by the IEEE -- and arrives with some new features.
READ MORE

Symbol Buys Trio Security

June 17, 2004 |
Three-factor encryption technology comes to Symbol handheld devices.
READ MORE

Cell Phone Virus Ringing

June 15, 2004 |
First mobile phone worm squirms through Symbian OS.
READ MORE

Learn the Basics of Handheld Security

June 03, 2004 |
While PDA and smartphone security is often a forgotten piece of the security infrastructure, these devices have the ability to transmit and receive viruses, and can be exploited in numerous ways. In this article, the first in a series on the subject, we provide a general overview of PDA security and discuss vulnerabilities, products, security issues, and policies.
READ MORE