TITLE

Software Aims To Zap Security Loopholes

AUTHOR(S)
Brown, Karen
PUB. DATE
April 2004
SOURCE
Wireless Week;4/1/2004, Vol. 10 Issue 8, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the downside to the use of mobile applications by information technology enterprises. Critical areas with regard to security; Efforts of mobile security systems providers to develop applications that address critical areas of mobile systems security; Need for a system that automatically erases device data; Suggestion on providing employees with standard personal digital assistants or smartphone devices equipped with security safeguards.
ACCESSION #
12793668

 

Related Articles

  • The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission. Rui Zhang; Jian Wei Wang; Yaobin Xie; Lizhong Wang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p1380 

    The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth...

  • Cellphone THEFT. BROWN, RACHEL // Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19 

    The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged...

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices. Ren-Junn Hwang; Feng-Fu Su; Loang-Shing Huang // Wireless Personal Communications;Aug2007, Vol. 42 Issue 2, p213 

    Abstract  In modern mobile communications, personal privacy and security are of top concern to mobile phone subscribers. Yet, owing to the limit of their processing capability, mainstream mobile manufacturers are still unable to apply advanced security protocol to mobile devices....

  • Introducing the mobile phone with manners. Coppinger, Rob // Engineer (00137758);9/12/2003, Vol. 292 Issue 7635, p13 

    Reports on the development of SenSay system, a combined mobile phone and personal digital assistant that diverts call to voicemail when its user is busy. System's use of the context aware technology; Sensors used by the system; Device intelligence.

  • ONE PLACE WHERE BIGGER WOULD BE BETTER. Parks, Manish // eWeek;11/13/2000, Vol. 17 Issue 46, p172 

    Reflects on the difficulties of using miniature cellular telephones and computers. Comparison of the ease of use of cellular phones and rotary phones; Observations on cutting-edge technology.

  • The magic of handhelds. Schwartz, Ephraim // InfoWorld;12/10/2001, Vol. 23 Issue 50, p60 

    Focuses on the advantages of using pocket handhelds compared to cellular telephones. Access on Terminal Services programs; Capability of processing a heavy duty database query on desktop; Creation of the compression and the actual viewing software for client devices.

  • PDA vs. Cell. Kirschner, Suzanne Kantra; Moyer, Michael // Popular Science;Jan2002, Vol. 260 Issue 1, p11 

    Evaluates several electronic devices that functions as a handheld computer and cellular phone.

  • Smart tools.  // Management Today;Aug1999, p39 

    Highlights the features of the Nokia 7110 media phone. Use of wireless application protocol; Capacity for accessing industry-standard Web pages; Speed in transmitting data; Retail price.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics