Going Phishing

Brown, Karen
December 2005
Wireless Week;12/15/2005, Vol. 11 Issue 25, p14
Trade Publication
The article discusses phishing in the wireless industry. A definition for the term phishing is provided. The strategy used by hackers in committing wireless phishing scams is discussed. There are several steps that can be taken by mobile enterprise users, users of Bluetooth-enabled phones and chief information officers to prevent phishing exploits.


Related Articles

  • Security risks overplayed, says Bluetooth SIG. Wieland, Ken // Telecommunications - International Edition;Sep2004, Vol. 38 Issue 9, p8 

    Analyzes the article "Bluetooth still needs security bite" by Ollie Whitehouse published in the July 2004 issue of the periodical "Telecommunications International." Incorrectness of assertions in article about Bluetooth version 1.2; Susceptibility of Bluetooth-enabled devices to 'Bluesnarfing';...

  • From 'bluejacking' to 'bluehacking'  // Wireless Asia;Feb2004, Vol. 7 Issue 1, p32 

    Reports on the 'bluejacking' trend spawned by Bluetooth technology. Users' detection of nearby devices and anonymous posting of messages on the devices; Security issues revolving around Class 1 Bluetooth devices; Problem of security gaps for corporate users who use Bluetooth devices to access...

  • AIRDEFENSE UNVEILS BLUEWATCH MONITORING FOR PDA.  // Computer Security Update;May2005, p7 

    This article reports that AirDefense Inc. in Atlanta, a leader in anywhere, anytime wireless security monitoring, has unveiled AirDefense BlueWatch, the industry's first commercial-grade Bluetooth monitoring solution available on personal digital assistants. AirDefense BlueWatch enables...

  • WIRELESS SECURITY. Bentley, Ross // New Media Age;1/11/2007, Special section p9 

    This article discusses how to ensure the security of wireless technologies. Although they offer users convenience and mobility, wireless technologies come with security risks. Encryption is a vital element of wireless security and means the encryption software has to be loaded on every device...

  • IS BLUETOOTH A CANDIDATE FOR ADOPTION? Nobel, Carmen // eWeek;6/18/2001, Vol. 18 Issue 24, p25 

    Discusses the reluctance by United States carriers to buy into the slow-growing Bluetooth wireless technology despite efforts by cell phone makers to promote Bluetooth-enabled handsets. Carriers' issue with price; Proponents' encouragement of carriers to get involved with developing future...

  • SOMETHING OLD, SOMETHING NEW.  // PM Network;Jun2006, Vol. 20 Issue 6, p16 

    The article reports on a 1.6 million sterling pound project based at the University of Bath in Great Britain which is expected to turn the city's center into a pervasive computing zone without disturbing the city's 18th century Georgian architecture. The Cityware project will use wireless...

  • Bluetooth backers OK with '06 adoption estimates. Meyer, Dan // RCR Wireless News;7/15/2002, Vol. 21 Issue 28, p6 

    Presents information on Bluetooth technology. Prediction on the sales revenue of the bluetooth industry in 2006; Comparison of the rates of adoption between Bluetooth and other wireless networking technologies; Problems facing Bluetooth.

  • A Novel approach for Evil Twin or Rogue AP mitigation in wireless environment. Panch, Ankit; Singh, Santosh Kumar // International Journal of Security & Its Applications;Oct2010, Vol. 4 Issue 4, p33 

    Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers. The phony Access point, with suspicious intentions broadcasts the Service Set...

  • Methods. Wolfe, Daniel // American Banker;8/22/2007, Vol. 172 Issue 162, p4 

    This article reports that fraudsters used several software files in an elaborate plan to phish banking information from users of Monster Worldwide Inc.'s job-hunting Web site, Monster.com. The first file, a Trojan horse called Infostealer.Monstres, may have been distributed through ads on the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics