Cyber Snipers

O'Hara, Carolyn
July 2005
Foreign Policy;Jul/Aug2005, Issue 149, p92
Focuses on the popularity of Bluetooth technology. Number of Bluetooth-enabled devices, including laptops, mobile phones and personal digital assistants, shipped every week worldwide; Projection that by 2008, more than half of all mobile phones will have Bluetooth technology; Ability of hackers to access mobile phones equipped with Bluetooth, as demonstrated by John Hering of Flexilis, a technology think tank.


Related Articles

  • PROTECTING INFORMATION. FRANK, KIMBERLY E.; CHARRON, DAVID // Strategic Finance;Jan2002, Vol. 83 Issue 7, p24 

    The article discusses how to prevent security breaches in corporate networks by means of laptop computers and other portable devices. A stolen laptop or cell phone presents unauthorized persons an opportunity to access a firm's data. Several protective measures can be implemented. Passwords...

  • Bluetooth's sprawl heightens security concerns. Cox, John // Network World;5/17/2004, Vol. 21 Issue 20, p8 

    As GSM cellular networks expand in the United States, more and more cellular phones are appearing with Bluetooth radios to link them with headsets and handhelds, network managers are getting concerned about security issues. More laptops are shipping with Bluetooth built in so that end users can...

  • Mobile Devices Vulnerable To Hackers.  // Business Communications Review;May2004, Vol. 34 Issue 5, p6 

    Reports that a research conducted by the Gartner Inc., has found out that vast majority of mobile communication devices lack protection against hackers.

  • DON'T JUST PHONE IT IN. Krause, Jason // ABA Journal;Apr2003, Vol. 89 Issue 4, p64 

    Offers suggestions for lawyers on buying mobile phones, personal digital assistants (PDA) and wireless pagers. Remarks from Ernest Svenson, technology partner with Gordon, Arata, McCollam, Duplantis and Eagan law firm; Example of built-in features found in mobile phones; Features of the Sprint...

  • Tribute's Top Tech Toys.  // Tribute;Sep2005, Vol. 22 Issue 6, p77 

    Evaluates several digital and mobile communications products. LifeDrive personal digital assistant from palmOne; Samsung SC-X105 Sports Cam camcorder; Portégé R200 notebook computer from Toshiba.

  • Laptops may be link to 3G apps, services. Omatseye, Sam // RCR Wireless News;10/15/2001, Vol. 20 Issue 42, p1 

    Explores the convergence of wireless laptop computers and handheld devices as a possible transition stage before third-generation applications and services attain full bloom. Impact of the convergence on telecommunication carriers; Advantages of the convergence between the 802.11 standard-based...

  • Site sheds light on workflow jargon. Caton, Michael // eWeek;2/21/2005, Vol. 22 Issue 8, p50 

    The article reports that Mobile Edge has launched computer carriers with a Wireless Security Shield Pocket, made of radio-blocking material that forms a physical firewall between mobile devices and hackers or virus-infected Bluetooth devices, big enough to accommodate a PDA and a small cell...

  • Bluetooth Security Analysis for Mobile Phones. Alfaiate, Joã o; Fonseca, José // CISTI (Iberian Conference on Information Systems & Technologies ;Jun2012, p169 

    Mobile devices are becoming more and more omnipresent due to their lightweight, small size and increasing performance. Almost every mobile device has Bluetooth (BT) capabilities and this powerful combination widely used in our daily life is coming to new environments like the car and the...

  • BLUETOOTH SECURITY THREATS AND SOLUTIONS: A SURVEY. Minar, Nateq Be-Nazir Ibn; Tarique, Mohammed // International Journal of Distributed & Parallel Systems;Jan2012, Vol. 3 Issue 1, p127 

    Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics