Mobile Security - Article Archives - Page 41

Protocol Flaw Puts VoIP Users at Risk

January 13, 2004 |
Security vulnerability in a common data transmission protocol is labeled 'moderately critical.'
READ MORE

Making Sense of Evolving WLAN Standards, Part 1: Security

January 05, 2004 |
As the move to better security becomes bogged down in bureaucracy, its time to address the issue of whether WLAN security is still as bad as some perceive, or if the gap between wired and wireless security is starting to close.
READ MORE

More Wi-Fi Means More Attacks

December 22, 2003 |
The monitoring of the air at the Wi-Fi Planet Conference revealed fewer security attacks over all, but far more than before that were successful.
READ MORE

New China Security Fragments Wi-Fi Future

December 19, 2003 |
Beijing's orders that wireless vendors work with Chinese companies to use the here-to-fore unheard of WAPI security standard could hurt equipment makers and travelers alike.
READ MORE

Bush Signs Can Spam Bill

December 16, 2003 |
UPDATE: With the stroke of the president's pen moving the legislation into law Tuesday, e-mail marketers will have to comply with new opt-out measures. But consumer groups question whether the bill has teeth.
READ MORE

Congress Sends Can Spam Act to White House

December 08, 2003 |
Landmark opt-out plan sets first national standards for regulating unsolicited commercial e-mail.
READ MORE

Wireless Marketers Try To Preempt Spam Deluge

December 08, 2003 |

Ads via text messaging have become a burgeoning phenom, but the mobile industry's major stakeholders are working to ensure rogue marketers don't spoil the party.

READ MORE

New Bill For Wireless 411 Privacy

November 21, 2003 |
Ahead of the rollout of national 411 for cell phone numbers, lawmakers mull how to help keep customers 'unpublished.'
READ MORE

The Future of Open Source in Security

November 19, 2003 |
Fresh from the 2nd Annual Open Source Symposium, Lyne Bourque reports on how open source is contributing to network security for enterprises.
READ MORE

The Firewall and the Wandering Workers

November 17, 2003 |
Corporations with strong firewall defenses didn't take long to figure out that their greatest threat was from employees who log on from outside the building. Executive Tech columnist Brian Livingston outlines some new solutions to this security hazard.
READ MORE

Sun Launches 'Java Card S' Program

November 17, 2003 |
The network computer maker releases new specifications and a development kit as part of its secure digital identity vision.
READ MORE

Arrested Criminal Hackers Used Wi-Fi

November 13, 2003 |
Two Michigan men have been arrested and released on bond after the FBI picked them up for causing damage to a protected computer system -- all from a store parking lot.
READ MORE

IT Spending To Rebound

November 11, 2003 |
IT spending is expected to increase in '04 — Web services, security, and wireless should benefit.
READ MORE

Weakness Found in Wi-Fi Security Protocol

November 06, 2003 |
A glaring weakness in the interface design of the WPA protocol could open the door to passphrase cracking attacks.
READ MORE

War Driving No Game to IT Managers

November 05, 2003 |
Cruising the streets with a laptop to scan for unsecure wireless connections is one of the latest techie crazes. But the growing popularity of 'war driving' underscores the security problems facing networks that have gone wireless.
READ MORE

First Homeland Security Tech Incubator Opens

October 13, 2003 |
Maryland debuts early stage companies developing solutions for biodefense, communications and information technology.
READ MORE

Consumer Cards Turned Rogue Detectors

October 06, 2003 |
Could a new scheme by WLAN management software maker Wavelink turn all existing 802.11 cards into rogue monitoring systems? The potential is there with an initial partnership with D-Link, but a lack of standards in WLAN data gathering means it may not go far.
READ MORE

802.11 Hotspots Just the Start - More Wireless Management Scenarios on the Horizon

September 30, 2003 |
Enterprises and network administrators are starting to face an increasing number of new remote access and management scenarios beyond the ever-present need to secure corporate laptops at public hotspots.
READ MORE

Study: ID Theft Often Goes Unrecognized

September 24, 2003 |
ID Analytics conducts massive study on preventing identity fraud.
READ MORE

Who Needs Mobile Backup?

September 02, 2003 |
Despite IT resistance, the growing legions of mobile users are forcing enterprises -- and network admins -- to confront laptop backups.
READ MORE