Mobile Security - Article Archives - Page 39

RIM Refutes BlackBerry Buffer Overflow Claim

October 15, 2004 |
RIM gets security researcher to update their claims about previously identified issue.
READ MORE

Epok Targets Web Services Security

October 08, 2004 |
The firm launches an enhanced platform aimed at wireless carriers and the government sector.
READ MORE

Security Fears Still Blocking WLAN Adoption

September 21, 2004 |
A new report says that even though security issues are being addressed, they continue to be the main thing preventing enterprises from going wireless.
READ MORE

LucidLink Announces Security Upgrade

September 15, 2004 |
The relatively new software, which makes security simple for SMBs, is already getting a customer-demanded update to support more access points and to plug a potential hole.
READ MORE

Working Together for More Secure Software

September 07, 2004 |
eSecurityPlanet's columnist Ken van Wyk takes a look at Software Security, a new discipline that calls for security concerns to be considered throughout design, testing, implementation and deployment. van Wyk says it's the only way to truly have secure software.
READ MORE

Spam, DoS Headed VoIP's Way

August 23, 2004 |
Spam over Internet Telephony (SPIT) and DoS attacks could make IP telephony as vulnerable as e-mail.
READ MORE

Wi-Foo Author on Unsecured Wireless Networks

August 20, 2004 |
One of the authors of the new book Wi-Foo: The Secrets of Wireless Hacking talks exclusively to eSecurityPlanet about just how unsecure most networks are and what needs to be done about it.
READ MORE

With Wireless, Easy Road is Riskiest Path

August 16, 2004 |
When it comes to a wireless connection at home, convenience and ease-of-installment could lead you to an unsafe set up. eSecurityPlanet columnist Bob Hillery walks you through a safer connection -- for you and your corporate laptop.
READ MORE

Mosquito Trojan Bites Developer Back

August 13, 2004 |
In an attempt to copy protect its game Mosquito, Ojum embedded a Trojan Horse, uncovered this week by a number of anti-virus vendors. The Trojan dialer, however, not only affected illegitimate users of the game, but rightful players as well.
READ MORE

Trojan Horse Attacking SmartPhones

August 11, 2004 |
Unlike last week's malware, which targeted Pocket PCs, this week's malicious code hit Symbian smartphones running an illegal version of the game Mosquitoes.
READ MORE

Microsoft Office Upgrade Tackles Spam

July 27, 2004 |
The software giant targets spam in an Office 2003 upgrade and reworks two other components.
READ MORE

Security is in Wi-Fi Management's Future

July 20, 2004 |
Established WLAN management systems are getting more protection features -- and many vendors are changing their focus entirely toward security, because that's where the money is.
READ MORE

Too Many Lost Emails Leave us Unconnected

July 19, 2004 |
eSecurityPlanet's Ray Everett-Church is sick and tired of having his emails lost. With all of our technology, shouldn't this be the ''golden age'' of email? Sadly, it's not.
READ MORE

802.11i Security Specification Finalized

June 25, 2004 |
UPDATED: The long awaited standard for Wi-Fi-based LANs has been ratified by the IEEE -- and arrives with some new features.
READ MORE

Symbol Buys Trio Security

June 17, 2004 |
Three-factor encryption technology comes to Symbol handheld devices.
READ MORE

Cell Phone Virus Ringing

June 15, 2004 |
First mobile phone worm squirms through Symbian OS.
READ MORE

Learn the Basics of Handheld Security

June 03, 2004 |
While PDA and smartphone security is often a forgotten piece of the security infrastructure, these devices have the ability to transmit and receive viruses, and can be exploited in numerous ways. In this article, the first in a series on the subject, we provide a general overview of PDA security and discuss vulnerabilities, products, security issues, and policies.
READ MORE

You Can't Hide from the Laptop Grim Reaper

June 02, 2004 |
eSecurityPlanet's new columnist George Bakos talks about laptops -- mobile mine fields of any enterprise security plan. The best of us leave them unsecure or alone in a conference room. Bakos offers a few tricks for laptop information survival.
READ MORE

AirDefense Secures the Wireless Perimeter

May 24, 2004 |
In the rush to go wireless, administrators will find that they must supplement standard security measures with serious reporting and policy-enforcing products. Count AirDefense among them.
READ MORE

Cisco Confirms Stolen IOS Source Code

May 17, 2004 |
A corporate network breach leads to leaked proprietary code, but a company official says confidential customer data and financial systems weren't compromised.
READ MORE