TITLE

SOUND OFF!

PUB. DATE
April 2004
SOURCE
Wireless Week;4/1/2004, Vol. 10 Issue 8, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Presents a survey on efforts of wireless corporations to protect employees' mobile devices from hackers.
ACCESSION #
12793536

 

Related Articles

  • SECURITY SERVICES OF MOBILE TELEMETRY APPLICATION PROTOCOL. Gospodinova, Elitsa; Atanasov, Ivaylo; Pencheva, Evelina // Proceedings of the International Conference on Information Techn;2011, p131 

    The paper presents some security aspects of application layer protocol used for mobile telemetry. The protocol is on top of Internet Protocol (IP). As one of the main requirements is operation in as low energy as possible mode, the protocol exploits security mechanisms that are different from...

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • House committee expected to increase tracking standard. Weaver, Heather Forsgren // RCR Wireless News;9/25/2000, Vol. 19 Issue 39, p68 

    Focuses on the expectation for the passage of cellular phone location tracking legislation in the United States. Inclusion of the provision in the Electronic Communications Privacy Act of 2000; Aim of the bill to strengthen privacy rights; Uncertainty over the consideration of the bill.

  • Cellcos may face action against misuse of SIMs.  // Technology Times;12/22/2014, Vol. 5 Issue 50, p6 

    The article reports that the Pakistani government will make actions against cellular phone companies which have issued illegal subscriber identity module (SIM) cards that were used in terrorism.

  • Enterprise Screams for Network Security. Rockwell, Mark // Wireless Week;11/1/2006, Vol. 12 Issue 22, p37 

    The article discusses the need for network security as mobile devices in the corporate network grows. According to Michael Voellinger of Telwares, mobile devices have become an asset to companies, and it has to be managed. Companies with expanding mobile devices in their information technology...

  • VeriSign Tokens In Mobile Push. Wolfe, Daniel // American Banker;10/2/2009, Vol. 174 Issue F308, p5 

    The article focuses on VeriSign Inc. which is promoting a security system for mobile devices such as smart phones that is based on a format of one-time passcode tokens. The disadvantage in using hardware tokens and the advantage in VeriSign's token system are mentioned. Analyst Avivah Litan...

  • Don't Trust that Tower. FRIEDRICH, NANCY // Machine Design;11/6/2014, Vol. 86 Issue 12, p8 

    The author comments on the article "Rogue cell towers discovered in Washington, D.C.," posted on the www.csoonline.com, about the discovery of over a dozen rogue cell towers, also known as interceptors or international mobile security identity (IMSI) catchers in the U.S. Topics discussed...

  • Decoding Mobile Device Security. Blittz, Thomas // Security: Solutions for Enterprise Security Leaders;May2005, Vol. 42 Issue 5, p46 

    Focuses on the need of improved types of security measures for the protection of private data in mobile devices. Creation of virtual physical security; Threat of new generation of viruses specifically designed to infest smart phones; Provision of provable security to comply with data privacy...

  • Broadcast Security in Future Mobile Networks. Rohlik, M.; Vanek, T. // Electronics & Electrical Engineering;2014, Vol. 20 Issue 10, p69 

    A typical broadcast authentication communication within information distribution systems is characterised by plain text communication between nodes, which do not mutually authenticate. Although, the authentication of every incoming message seems to be a very effective way to mitigate a denial of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics