Software Aims To Zap Security Loopholes

Brown, Karen
April 2004
Wireless Week;4/1/2004, Vol. 10 Issue 8, p32
Trade Publication
Discusses the downside to the use of mobile applications by information technology enterprises. Critical areas with regard to security; Efforts of mobile security systems providers to develop applications that address critical areas of mobile systems security; Need for a system that automatically erases device data; Suggestion on providing employees with standard personal digital assistants or smartphone devices equipped with security safeguards.


Related Articles

  • Mobile VAS--from fantasy to reality. Chanay, Xavier // Telecommunications - International Edition;Feb2001, Vol. 35 Issue 2, p102 

    Discusses wireless telecommunication operators' ability to have value added service (VAS) interoperability by using security identity module (SIM) toolkit and javacard. Shortening of marketing time; Reduction of cost and risk; Impact of javacard technology on the SIM card market; Ramifications...

  • SOUND OFF!  // Wireless Week;4/1/2004, Vol. 10 Issue 8, p4 

    Presents a survey on efforts of wireless corporations to protect employees' mobile devices from hackers.

  • Smartphones are great tools, but at what risk? Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p9 

    This article focuses on the risk of using smartphones. Mobile phones are allegedly evolving into smartphones. For one, Sony has taken the step of backing out of the personal digital assistant market, choosing instead to back its Sony-Ericsson smartphone line. Manufacturers are cramming new...

  • A Design Approach for Wireless Communication Security in Bluetooth Network. Bijoy Kumar Mandal; Debnath Bhattacharyya; Tai-hoon Kim // International Journal of Security & Its Applications;2014, Vol. 8 Issue 2, p341 

    Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal...

  • Wireless Networking: Danger Ahead. Cunningham, Brian // Radio World;8/11/2010, p18 

    The article offers information concerning several ways to protect wireless network stations in the U.S. from external cyber attacks. It mentions that wireless facilities compromise the individual customer's computer files because anyone within the network can use others Internet connection for...

  • Cracks in the WAP. Chan, Tony // America's Network;02/15/2000, Vol. 104 Issue 3, p26 

    Focuses on the security problems faced by Wireless Applications Protocol (WAP)-based information and transaction services. Cellular technology encryption; Security solutions for WAP; Shortage of solutions for mobile commerce security.

  • Mobile security: an update. Munro, Ken // SC Magazine: For IT Security Professionals (UK Edition);Jul/Aug2012, p17 

    In this article, the author claims that new attack vectors and vulnerabilities are matching the progress in mobile device management (MDM) offerings. The author reveals that his concerns about simple man-in-middle attacks over Wifi have been partly resolved and lauds as well MDM products for its...

  • Make mobile working safer. Lannin, David // SC Magazine: For IT Security Professionals (UK Edition);Oct2006, p20 

    The author emphasizes the need for companies to secure their wireless networks. He cites the benefits of a mobile workforce. He mentions different methods for securing wireless networks. He claims that mobility and convergence benefits of mobile structure are realized within a secure...

  • VeriSign Tokens In Mobile Push. Wolfe, Daniel // American Banker;10/2/2009, Vol. 174 Issue F308, p5 

    The article focuses on VeriSign Inc. which is promoting a security system for mobile devices such as smart phones that is based on a format of one-time passcode tokens. The disadvantage in using hardware tokens and the advantage in VeriSign's token system are mentioned. Analyst Avivah Litan...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics