TITLE

Mobile Spies: wireless devices become hackers' tools of choice

AUTHOR(S)
Cortes, Rossie
PUB. DATE
October 2004
SOURCE
Caribbean Business;10/7/2004, Vol. 32 Issue 42, p38
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article states that wireless devices may put users more in touch than they bargained for as hackers have found ways to use these same gadgets to steal private data. While it is relatively secure to transfer information through wires, mobile devices pose a security risk in that they can download or transfer information straight from the airways without anyone realizing it. In Puerto Rico and elsewhere, the use of personal digital assistants, memory sticks, iPods, cell phones, and the like is on rise leaving experts worried about this security issue. Several of the larger network and software companies are still developing ways to increase security of wireless transmission and prevent mobile devices from stealing information.
ACCESSION #
14730108

 

Related Articles

  • Mobile e-mail devices could pose threat to networks. Goodwin, Bill // Computer Weekly;9/13/2005, p8 

    The article reports that, according to the analyst Gartner Group Inc., large organisations are leaving their networks vulnerable to attack by failing to police unofficial use of mobile e-mail devices by their staff. Staff are often tempted to link their personal mobile devices to the work e-mail...

  • Security a major concern for technology sector in 2004. Cortes, Rossie // Caribbean Business;12/30/2004, Vol. 32 Issue 54, p32 

    The article informs that security a major concern for technology sector in 2004. In an effort to take advantage of this increased demand for service, many companies such as Hewlett-Packard (HP), Microsoft, Oracle, and PeopleSoft have implemented outsourcing services, and established local...

  • Mobile Devices Vulnerable To Hackers.  // Business Communications Review;May2004, Vol. 34 Issue 5, p6 

    Reports that a research conducted by the Gartner Inc., has found out that vast majority of mobile communication devices lack protection against hackers.

  • '7 Steps' for network security. Ellis, Chris // Communications News;Feb2003, Vol. 40 Issue 2, p36 

    Provides strategies to ensure computer network security. Information on corporate network vulnerabilities such as hackers and data thieves; Details on auditing and testing network devices and servers; Advantages of a security policy.

  • Since you can't beat 'em, join 'em. Shaw, Keith // Network World;12/6/2004, Vol. 21 Issue 49, p50 

    This article focuses on ways used by computer hackers in attacking corporate networks in the U.S. Evidence suggests that more hackers are using compromised home personal computers to get into networks instead of trying to sneak by firewalls, intrusion-detection systems, and other security gear...

  • Untitled. Ashford, Warwick // Computer Weekly;9/14/2010, p6 

    The article reports that Adobe Systems Inc. has issued a warning that hackers are exploiting a new zero-day vulnerability in its Reader and Acrobat products to compromise computers. The company has recently released a Security Advisory about the flaw, rated as critical and identified as...

  • PROTECTING INFORMATION. FRANK, KIMBERLY E.; CHARRON, DAVID // Strategic Finance;Jan2002, Vol. 83 Issue 7, p24 

    The article discusses how to prevent security breaches in corporate networks by means of laptop computers and other portable devices. A stolen laptop or cell phone presents unauthorized persons an opportunity to access a firm's data. Several protective measures can be implemented. Passwords...

  • Third-party Oracle fix dilemma. Goodwin, Bill // Computer Weekly;2/7/2006, p42 

    The article reports that computer security researcher David Litchfield has released a workaround to protect computer networks from a critical flaw that could allow hackers to gain control of Oracle Corp.'s databases. The workaround is a third-party patch. The information technology departments...

  • Be secure: Think like bad guys. Messmer, Ellen // Network World;4/11/2005, Vol. 22 Issue 14, p1 

    This article reports that security managers at the InfoSec World conference say they are combating the risks posed by outsider attacks and insider exploits by thinking, and sometimes acting like hackers. JP Morgan Chase, the Hartford Financial Services Group, the Mayo Foundation, and Maven...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics