Blog Posts Tagged with "Wireless"


Laptop and Cell Phone Data Searched at Airport

November 22, 2010 Added by:Anthony M. Freed

Your computer and cellphone data can be searched by customs officials. If it is really the case that authorities can act as if our Constitutional rights end at the airport terminal, we have much bigger problems than naked body scans and groping screeners touching our junk...

Comments  (8)


Mobile Phone Security Under Attack

November 11, 2010 Added by:Robert Siciliano

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. As applications and other content are more widely distributed, security breaches will be inevitable...

Comments  (0)


Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)


GPS Tracking of Stolen Cell Phone Nabs Thief

November 01, 2010 Added by:Stephen Gantz

As private individuals, the victims were well within their legal rights to track the suspect and their location. This is not the case for law enforcement personnel in general, who are required to obtain subpoenas before they can access tracking data...

Comments  (0)


Protecting Against Mobile Computing Risks

October 31, 2010 Added by:Allan Pratt, MBA

With all the hoopla about mobile computing, everyone knows the basic concerns. There are the geographical concerns, the financial concerns, the information security concerns, and, of course, there is the physical security issues...

Comments  (0)


Google Street View and Unencrypted Wi-Fi: Not a Hazard

October 25, 2010 Added by:Robert Gezelter

The effort being focused on Google would be far better spent on educating users about the hazards. Google is caught being an identifiable target. The Street Wise vehicle cruising down the block every few years is not a serious hazard to privacy and security...

Comments  (1)


Is Geo Location Based DDoS Possible?

October 19, 2010 Added by:Bozidar Spirovski

There are 4.6 billion mobile phones worldwide, a truly formidable number capable of performing a DDoS attack on any mobile network. But creating a DDoS attack isn't simple - especially a Geo Location based DDoS. In order to make a DDoS attack, you need the following ingredients...

Comments  (2)


Will Smart Phones Replace Credit Cards?

September 22, 2010 Added by:Danny Lieberman

Mobile payment technology has been around for about 10 years and it has not really taken off in a big way – although there are niche applications. Clearly it’s not a technology barrier to entry but a cultural barrier to entry...

Comments  (0)


Weaponizing the Nokia N900 - Part 2

September 21, 2010 Added by:shawn merdinger

Welcome to the 2nd post in my series of leveraging the power of the Nokia N900 handheld using opensource, cutting-edge security tools for ethical penetration testing. The idea is to cover security-related tools and packages that enhance the N900's capability as a penetration testing platform...

Comments  (0)


Telecom Development: Simple Rules, No Magic

September 10, 2010 Added by:Rahul Neel Mani

The pace of growth at Reliance Communications is faster than that of other leading telcos in India, says Alpna Doshi, CIO, Reliance Communications. In a chat with Rahul Neel Mani, she outlines the company’s IT plans and growth initiatives in the immediate future...

Comments  (0)


Mobile Banking Application Development

September 09, 2010 Added by:Brent Huston

A lot of financial institutions are interested in having a mobile app for their customers and members. Many of these apps are well designed, deep and rich. Many are simply canned front ends to existing web page content and functionality. A few are just plain horrible...

Comments  (3)


It's a Feature - Remote Tapping a Snom VoIP Phone

September 07, 2010 Added by:shawn merdinger

An attacker could search for Snom phones exposed on the Internet, determine if they are using HTTP authentication or not, and easily connect the the Snom VoIP phone's webserver and punch in the number to dial -- clearly opening up avenues to cause grief. Pretty bad stuff, right?

Comments  (0)


Good Reasons to Lock Down Your Wireless Network

September 05, 2010 Added by:Christopher Burgess

Anyone in proximity to your business, home or office may be within the exploitable footprint of Wi-Fi signal, they can collect your SSID and MAC addresses, and if your network is not secured, their odds of being able to collect information traversing the connection increases exponentially...

Comments  (4)


Location Based Services - A Double-Edged Sword

August 31, 2010 Added by:Christopher Burgess

How about you? Are you appending your geo-coordinates or location to each social network update you are creating, be it on Twitter, Facebook, SkyRock, Sonico, Qzone or the like? I see the use of location-based services as both reasonable and worrisome...

Comments  (0)


mCrime Higher on Hackers’ Radar

August 30, 2010 Added by:Robert Siciliano

Over the next few years as millions of smartphones replace handhelds and billions of applications are downloaded, risks of mobile crime - mCrime - will rise. Large antivirus companies are snapping up smaller mobile phone security companies in anticipation of a deluge of mobile attacks...

Comments  (3)


iPhone Geo Blocking and Your Privacy

August 24, 2010 Added by:Rob Fuller

Earlier this summer I was approached by Savant, who told me that a bunch of my Twitpics had geo location in them. At a recent NoVA Hackers meetup there was a presentation about Geo forensics on mobile phones that was really enlightening, but very depressing for iPhone users like myself...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »