April 2004
Wireless Week;4/1/2004, Vol. 10 Issue 8, p4
Trade Publication
Presents a survey on efforts of wireless corporations to protect employees' mobile devices from hackers.


Related Articles

  • Smartphones are great tools, but at what risk? Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p9 

    This article focuses on the risk of using smartphones. Mobile phones are allegedly evolving into smartphones. For one, Sony has taken the step of backing out of the personal digital assistant market, choosing instead to back its Sony-Ericsson smartphone line. Manufacturers are cramming new...

  • MOBILE SECURITY BY THE NUMBERS. Richards, Kathleen // Information Security;Jul/Aug2013, Vol. 15 Issue 6, p25 

    The article discusses the results of the 2013 Enterprise Mobile Security Survey. Roughly 60% of survey respondents believe mobile devices present more risk to their organizations and that they need security technologies on devices. About half of respondents revealed that their organizations...

  • Cracks in the WAP. Chan, Tony // America's Network;02/15/2000, Vol. 104 Issue 3, p26 

    Focuses on the security problems faced by Wireless Applications Protocol (WAP)-based information and transaction services. Cellular technology encryption; Security solutions for WAP; Shortage of solutions for mobile commerce security.

  • Mobile security: an update. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2012, p17 

    In this article, the author claims that new attack vectors and vulnerabilities are matching the progress in mobile device management (MDM) offerings. The author reveals that his concerns about simple man-in-middle attacks over Wifi have been partly resolved and lauds as well MDM products for its...

  • Make mobile working safer. Lannin, David // SC Magazine: For IT Security Professionals (UK Edition);Oct2006, p20 

    The author emphasizes the need for companies to secure their wireless networks. He cites the benefits of a mobile workforce. He mentions different methods for securing wireless networks. He claims that mobility and convergence benefits of mobile structure are realized within a secure...

  • Mobile VAS--from fantasy to reality. Chanay, Xavier // Telecommunications - International Edition;Feb2001, Vol. 35 Issue 2, p102 

    Discusses wireless telecommunication operators' ability to have value added service (VAS) interoperability by using security identity module (SIM) toolkit and javacard. Shortening of marketing time; Reduction of cost and risk; Impact of javacard technology on the SIM card market; Ramifications...

  • VeriSign Tokens In Mobile Push. Wolfe, Daniel // American Banker;10/2/2009, Vol. 174 Issue F308, p5 

    The article focuses on VeriSign Inc. which is promoting a security system for mobile devices such as smart phones that is based on a format of one-time passcode tokens. The disadvantage in using hardware tokens and the advantage in VeriSign's token system are mentioned. Analyst Avivah Litan...

  • Security in Wireless Networks. Tillison, Joe // ECN: Electronic Component News;May2010, Vol. 54 Issue 6, p20 

    The article discusses the security vulnerability of wireless systems based on the research of InGuardians Inc. It says that the weak spot of any secure wireless system is the inadequate safeguarding of the security keys. It mentions that to win the public's confidence with these new gadgets,...

  • Bluetooth Wireless Network Authentication Using Radio Frequency Communication Protocol. Waleed, Ghossoon M.; Faizal, M.; Ahmad, R. B.; Malek, M. Fareq B. Abd; Ghani, M. Alif // Journal of Computer Science;2009, Vol. 5 Issue 9, p646 

    Problem statement: Bluetooth has emerged as very popular ad hoc network standard today. Bluetooth network applications include wireless synchronization, e-mail/internet/intranet access using local personal computer connections, hidden computing through automated applications and networking. Due...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics