Mobile Devices Vulnerable To Hackers

May 2004
Business Communications Review;May2004, Vol. 34 Issue 5, p6
Trade Publication
Reports that a research conducted by the Gartner Inc., has found out that vast majority of mobile communication devices lack protection against hackers.


Related Articles

  • Mobile Spies: wireless devices become hackers' tools of choice. Cortes, Rossie // Caribbean Business;10/7/2004, Vol. 32 Issue 42, p38 

    The article states that wireless devices may put users more in touch than they bargained for as hackers have found ways to use these same gadgets to steal private data. While it is relatively secure to transfer information through wires, mobile devices pose a security risk in that they can...

  • Wireless in enterprise often open door to hackers. Dano, Mike // RCR Wireless News;3/7/2005, Vol. 24 Issue 10, p12 

    Focuses on the vulnerability of wireless and mobile communications systems to hackers and corporate infiltrators. Impact of hacking; Security concerns of corporations over the use of mobile phones; Examples of software companies that offer and provide mobile security systems and services.

  • Mobile e-mail devices could pose threat to networks. Goodwin, Bill // Computer Weekly;9/13/2005, p8 

    The article reports that, according to the analyst Gartner Group Inc., large organisations are leaving their networks vulnerable to attack by failing to police unofficial use of mobile e-mail devices by their staff. Staff are often tempted to link their personal mobile devices to the work e-mail...

  • Mobiles Can't Ward Off Hackers, Gartner Reports.  // Electronic News;4/5/2004, Vol. 50 Issue 14, pN.PAG 

    Focuses on a report from Gartner Inc. which estimated the number of mobile devices that lack protection from hackers. Solution suggested to enterprises; Techniques to improve wireless security.

  • Cyber Snipers. O'Hara, Carolyn // Foreign Policy;Jul/Aug2005, Issue 149, p92 

    Focuses on the popularity of Bluetooth technology. Number of Bluetooth-enabled devices, including laptops, mobile phones and personal digital assistants, shipped every week worldwide; Projection that by 2008, more than half of all mobile phones will have Bluetooth technology; Ability of hackers...

  • Phone viruses: how bad is it? Biever, Celeste // New Scientist;3/5/2005, Vol. 185 Issue 2489, p25 

    The article focuses on the anti virus software of cellphones. Unlike PCs, phones simply have too many different operating systems for viruses to exploit. And there are too few people who own the smart phones capable of receiving and transmitting new software-- like a virus--to pose a real risk....

  • Mobile Security. Dysart, Joe // Electrical Wholesaling;May2012, p28 

    The article offers information on how companies secure their variable information against cyber intruders in the U.S. It reveals that smartphones owned by employees may provide unauthorized passage into the company's information technology (IT) system for computer hackers if they are not...

  • PDA security: mobile employees risk corporate data.  // MarketWatch: Global Round-up;October 2004, Vol. 3 Issue 10, p155 

    This article reports that the Mobile Vulnerability Survey 2004, commissioned by Pointsec Mobile Technologies, Infosecurity Europe and Computer Business Review, was conducted among 68 IT managers, of which 38% came from companies employing over 1,000 employees. It found that 13% of respondents...

  • An Analysis on Endaira: A Provably Secure On-Demand Source Routing Protocol. Abidin, A. F. A.; Usop, N. S. M.; Zulkifli, N. H. N. // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 3, p437 

    Abstract-Routing is one of the most basic networking functions in mobile ad hoc networks. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. Hence, an adversary can easily paralyze the operation of the network by attacking the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics