TITLE

Software Aims To Zap Security Loopholes

AUTHOR(S)
Brown, Karen
PUB. DATE
April 2004
SOURCE
Wireless Week;4/1/2004, Vol. 10 Issue 8, p32
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the downside to the use of mobile applications by information technology enterprises. Critical areas with regard to security; Efforts of mobile security systems providers to develop applications that address critical areas of mobile systems security; Need for a system that automatically erases device data; Suggestion on providing employees with standard personal digital assistants or smartphone devices equipped with security safeguards.
ACCESSION #
12793668

 

Related Articles

  • The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission. Rui Zhang; Jian Wei Wang; Yaobin Xie; Lizhong Wang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p1380 

    The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth...

  • Enterprise Screams for Network Security. Rockwell, Mark // Wireless Week;11/1/2006, Vol. 12 Issue 22, p37 

    The article discusses the need for network security as mobile devices in the corporate network grows. According to Michael Voellinger of Telwares, mobile devices have become an asset to companies, and it has to be managed. Companies with expanding mobile devices in their information technology...

  • VeriSign Tokens In Mobile Push. Wolfe, Daniel // American Banker;10/2/2009, Vol. 174 Issue F308, p5 

    The article focuses on VeriSign Inc. which is promoting a security system for mobile devices such as smart phones that is based on a format of one-time passcode tokens. The disadvantage in using hardware tokens and the advantage in VeriSign's token system are mentioned. Analyst Avivah Litan...

  • Cellphone THEFT. BROWN, RACHEL // Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19 

    The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged...

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • Introducing the mobile phone with manners. Coppinger, Rob // Engineer (00137758);9/12/2003, Vol. 292 Issue 7635, p13 

    Reports on the development of SenSay system, a combined mobile phone and personal digital assistant that diverts call to voicemail when its user is busy. System's use of the context aware technology; Sensors used by the system; Device intelligence.

  • ONE PLACE WHERE BIGGER WOULD BE BETTER. Parks, Manish // eWeek;11/13/2000, Vol. 17 Issue 46, p172 

    Reflects on the difficulties of using miniature cellular telephones and computers. Comparison of the ease of use of cellular phones and rotary phones; Observations on cutting-edge technology.

  • The magic of handhelds. Schwartz, Ephraim // InfoWorld;12/10/2001, Vol. 23 Issue 50, p60 

    Focuses on the advantages of using pocket handhelds compared to cellular telephones. Access on Terminal Services programs; Capability of processing a heavy duty database query on desktop; Creation of the compression and the actual viewing software for client devices.

  • PDA vs. Cell. Kirschner, Suzanne Kantra; Moyer, Michael // Popular Science;Jan2002, Vol. 260 Issue 1, p11 

    Evaluates several electronic devices that functions as a handheld computer and cellular phone.

Share

Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics