April 2004
Wireless Week;4/1/2004, Vol. 10 Issue 8, p4
Trade Publication
Presents a survey on efforts of wireless corporations to protect employees' mobile devices from hackers.


Related Articles

  • SECURITY SERVICES OF MOBILE TELEMETRY APPLICATION PROTOCOL. Gospodinova, Elitsa; Atanasov, Ivaylo; Pencheva, Evelina // Proceedings of the International Conference on Information Techn;2011, p131 

    The paper presents some security aspects of application layer protocol used for mobile telemetry. The protocol is on top of Internet Protocol (IP). As one of the main requirements is operation in as low energy as possible mode, the protocol exploits security mechanisms that are different from...

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • House committee expected to increase tracking standard. Weaver, Heather Forsgren // RCR Wireless News;9/25/2000, Vol. 19 Issue 39, p68 

    Focuses on the expectation for the passage of cellular phone location tracking legislation in the United States. Inclusion of the provision in the Electronic Communications Privacy Act of 2000; Aim of the bill to strengthen privacy rights; Uncertainty over the consideration of the bill.

  • Cellcos may face action against misuse of SIMs.  // Technology Times;12/22/2014, Vol. 5 Issue 50, p6 

    The article reports that the Pakistani government will make actions against cellular phone companies which have issued illegal subscriber identity module (SIM) cards that were used in terrorism.

  • Don't Trust that Tower. FRIEDRICH, NANCY // Machine Design;11/6/2014, Vol. 86 Issue 12, p8 

    The author comments on the article "Rogue cell towers discovered in Washington, D.C.," posted on the www.csoonline.com, about the discovery of over a dozen rogue cell towers, also known as interceptors or international mobile security identity (IMSI) catchers in the U.S. Topics discussed...

  • Decoding Mobile Device Security. Blittz, Thomas // Security: Solutions for Enterprise Security Leaders;May2005, Vol. 42 Issue 5, p46 

    Focuses on the need of improved types of security measures for the protection of private data in mobile devices. Creation of virtual physical security; Threat of new generation of viruses specifically designed to infest smart phones; Provision of provable security to comply with data privacy...

  • Broadcast Security in Future Mobile Networks. Rohlik, M.; Vanek, T. // Electronics & Electrical Engineering;2014, Vol. 20 Issue 10, p69 

    A typical broadcast authentication communication within information distribution systems is characterised by plain text communication between nodes, which do not mutually authenticate. Although, the authentication of every incoming message seems to be a very effective way to mitigate a denial of...

  • INTEGRATING MOBILE. Hale, James // SC Magazine: For IT Security Professionals (15476693);Feb2016, Vol. 27 Issue 2, p30 

    The article presents views on mobile security. It notes that mobile vulnerability is caused by slow adoption of mobile devices by many organizations and risky behavior of users that led to spreading of malware. It is advised to regulate bring-your-own-device (BYOD) policies. The experts who...

  • BLOWFISH.  // J@pan Inc.;Feb2003, Issue 40, p48 

    Discusses the results of several surveys in Japan. Average duration of the use of cellular telephones; Preferred year-end gifts by housewives; Means most frequently used to make contact with friends when outside of the workplace; Main factors which influenced consumers to buy bottled water.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics