TITLE

Going Phishing

AUTHOR(S)
Brown, Karen
PUB. DATE
December 2005
SOURCE
Wireless Week;12/15/2005, Vol. 11 Issue 25, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses phishing in the wireless industry. A definition for the term phishing is provided. The strategy used by hackers in committing wireless phishing scams is discussed. There are several steps that can be taken by mobile enterprise users, users of Bluetooth-enabled phones and chief information officers to prevent phishing exploits.
ACCESSION #
19232955

 

Related Articles

  • Security risks overplayed, says Bluetooth SIG. Wieland, Ken // Telecommunications - International Edition;Sep2004, Vol. 38 Issue 9, p8 

    Analyzes the article "Bluetooth still needs security bite" by Ollie Whitehouse published in the July 2004 issue of the periodical "Telecommunications International." Incorrectness of assertions in article about Bluetooth version 1.2; Susceptibility of Bluetooth-enabled devices to 'Bluesnarfing';...

  • From 'bluejacking' to 'bluehacking'  // Wireless Asia;Feb2004, Vol. 7 Issue 1, p32 

    Reports on the 'bluejacking' trend spawned by Bluetooth technology. Users' detection of nearby devices and anonymous posting of messages on the devices; Security issues revolving around Class 1 Bluetooth devices; Problem of security gaps for corporate users who use Bluetooth devices to access...

  • AIRDEFENSE UNVEILS BLUEWATCH MONITORING FOR PDA.  // Computer Security Update;May2005, p7 

    This article reports that AirDefense Inc. in Atlanta, a leader in anywhere, anytime wireless security monitoring, has unveiled AirDefense BlueWatch, the industry's first commercial-grade Bluetooth monitoring solution available on personal digital assistants. AirDefense BlueWatch enables...

  • WIRELESS SECURITY. Bentley, Ross // New Media Age;1/11/2007, Special section p9 

    This article discusses how to ensure the security of wireless technologies. Although they offer users convenience and mobility, wireless technologies come with security risks. Encryption is a vital element of wireless security and means the encryption software has to be loaded on every device...

  • Bluetooth backers OK with '06 adoption estimates. Meyer, Dan // RCR Wireless News;7/15/2002, Vol. 21 Issue 28, p6 

    Presents information on Bluetooth technology. Prediction on the sales revenue of the bluetooth industry in 2006; Comparison of the rates of adoption between Bluetooth and other wireless networking technologies; Problems facing Bluetooth.

  • IS BLUETOOTH A CANDIDATE FOR ADOPTION? Nobel, Carmen // eWeek;6/18/2001, Vol. 18 Issue 24, p25 

    Discusses the reluctance by United States carriers to buy into the slow-growing Bluetooth wireless technology despite efforts by cell phone makers to promote Bluetooth-enabled handsets. Carriers' issue with price; Proponents' encouragement of carriers to get involved with developing future...

  • SOMETHING OLD, SOMETHING NEW.  // PM Network;Jun2006, Vol. 20 Issue 6, p16 

    The article reports on a 1.6 million sterling pound project based at the University of Bath in Great Britain which is expected to turn the city's center into a pervasive computing zone without disturbing the city's 18th century Georgian architecture. The Cityware project will use wireless...

  • A Novel approach for Evil Twin or Rogue AP mitigation in wireless environment. Panch, Ankit; Singh, Santosh Kumar // International Journal of Security & Its Applications;Oct2010, Vol. 4 Issue 4, p33 

    Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers. The phony Access point, with suspicious intentions broadcasts the Service Set...

  • Design of Context-Aware based Information Prevention for Digital Signage. Sungmo Jung; Younsam Chae; Jonghun Shin; Uyeol Baek; Seoksoo Kim // International Journal of Multimedia & Ubiquitous Engineering;May2013, Vol. 8 Issue 3, p359 

    Many applications using the Bluetooth technology for the revitalization of smart phones have emerged, and hacking these applications has caused vulnerability of wireless networks. Bluetooth is authenticated through unique address value of each device. However, hackers can attack the information...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics