TITLE

Mobiles Can't Ward Off Hackers, Gartner Reports

PUB. DATE
April 2004
SOURCE
Electronic News;4/5/2004, Vol. 50 Issue 14, pN.PAG
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on a report from Gartner Inc. which estimated the number of mobile devices that lack protection from hackers. Solution suggested to enterprises; Techniques to improve wireless security.
ACCESSION #
12858896

 

Related Articles

  • Mobile e-mail devices could pose threat to networks. Goodwin, Bill // Computer Weekly;9/13/2005, p8 

    The article reports that, according to the analyst Gartner Group Inc., large organisations are leaving their networks vulnerable to attack by failing to police unofficial use of mobile e-mail devices by their staff. Staff are often tempted to link their personal mobile devices to the work e-mail...

  • PDA security: mobile employees risk corporate data.  // MarketWatch: Global Round-up;October 2004, Vol. 3 Issue 10, p155 

    This article reports that the Mobile Vulnerability Survey 2004, commissioned by Pointsec Mobile Technologies, Infosecurity Europe and Computer Business Review, was conducted among 68 IT managers, of which 38% came from companies employing over 1,000 employees. It found that 13% of respondents...

  • Mobile Devices Vulnerable To Hackers.  // Business Communications Review;May2004, Vol. 34 Issue 5, p6 

    Reports that a research conducted by the Gartner Inc., has found out that vast majority of mobile communication devices lack protection against hackers.

  • Security a major concern for technology sector in 2004. Cortes, Rossie // Caribbean Business;12/30/2004, Vol. 32 Issue 54, p32 

    The article informs that security a major concern for technology sector in 2004. In an effort to take advantage of this increased demand for service, many companies such as Hewlett-Packard (HP), Microsoft, Oracle, and PeopleSoft have implemented outsourcing services, and established local...

  • Carriers need to spend money to make money. Hart, Tole // RCR Wireless News;1/21/2008, Vol. 27 Issue 2, p12 

    The author offers his views on the future of the wireless industry. He mentions the result of the Gartner Inc. research which indicates that there are a number of reasons why carriers will continue to spend on network infrastructure in the next five to 10 years. He believes that increasing...

  • Worldwide mobile sales on the up, says analyst.  // Electronics Weekly;9/10/2003, Issue 2114, p8 

    Worldwide mobile phone sales grew for the second consecutive quarter reaching 114.9 million units in the second quarter of 2003, according to analyst company Gartner Group Inc. This was a 12 per cent increase compared with the same quarter in 2002 and a two per cent increase over the first...

  • PROTECTING INFORMATION. FRANK, KIMBERLY E.; CHARRON, DAVID // Strategic Finance;Jan2002, Vol. 83 Issue 7, p24 

    The article discusses how to prevent security breaches in corporate networks by means of laptop computers and other portable devices. A stolen laptop or cell phone presents unauthorized persons an opportunity to access a firm's data. Several protective measures can be implemented. Passwords...

  • Performance Tuning of Data Transfer in Vehicular Networks. Dinakaran, M.; Balasubramanie, P. // International Journal of Computer Science Issues (IJCSI);Jan2012, Vol. 9 Issue 1, p350 

    Uninterrupted connectivity to Internet services during mobility is an increased demand nowadays. When a user is traveling through a vehicle like car or train, it is important to have a continuous Internet connection without connection break-ups and data losses. This vehicular Internet...

  • Survey reveals increasing risk of sloppy mobile security habits.  // Credit Control;2005, Vol. 26 Issue 8, p47 

    The article reports on the increasing risk of sloppy mobile security habits in Great Britain, according to "The Mobile Usage Survey 2005." The survey found that 30 percent of mobile device users do not use passwords or any other security protection. And yet, three out of ten use mobile devices...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics