TITLE

Wanted: Mobile CSF

AUTHOR(S)
Lowenstein, Mark
PUB. DATE
January 2006
SOURCE
Wireless Week;1/15/2006, Vol. 12 Issue 2, p33
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the factors to consider when implementing consumer security framework which addresses security concerns over the use of multimedia and Internet access on cellular telephones. The framework must have anti-spam and anti-virus features. The framework should also allow consumers to control the content of multimedia messages. It must create a proper opt-in/opt-out procedures.
ACCESSION #
19481918

 

Related Articles

  • E-mail Essentials. D'Accordo, Armando // Journal of the CPA Practitioner;Jun/Jul2010, Vol. 2 Issue 3, p7 

    The article offers helpful tips on how to protect and increase productivity in the business while integrating technology within the company such as the use of electronic mails. It highlights several issues including free electronic mail, hosted or in-house exchange, as well as electronic mail...

  • Toughest ever security tests. Winter, Daniel // Australian PC User;Sep2006, Vol. 18 Issue 9, p40 

    The article introduces several reviews of security suites for computer privacy and security. The reviewers tested programs in four main security categories: Firewalls, anti-spyware, anti-virus programs and spam blocker. Most of the antivirus programs are effective and firewalls were a mixed...

  • Top Tewnty Viruses Reported To Kaspersky In December.  // Software World;Jan2007, Vol. 38 Issue 1, p24 

    The article presents the top 20 viruses including Warezov worm family, Warezov variants, and Warezov. fb found in the email traffic reported to the world's fastest antivirus updates Kaspersky in December 2006. The results showed no any substantial changes to the assortment of viruses as Warezov...

  • A best practice guide to email encryption. Cowper, Jamie // IM@T.Online;Apr2007, p1 

    The article presents some suggestions related to selection of an e-mail encryption solution, which is aimed at supporting the growth and changes within a business organization's e-mail architecture. An e-mail encryption solution mitigates data security risks and protect information. It is...

  • Cellphone Viruses: How Worried Should You Be? Krapf, Eric // Business Communications Review;Jul2004, Vol. 34 Issue 7, p14 

    The article focuses on cellphone viruses. In what some fear could be a harbinger of worse attacks, a virus struck smart phones last month. The particular attack, dubbed "Cabir," was benign in that it didn't do any actual damage; it just spread. Cabir used the Bluetooth specification to spread...

  • Users warned of mobile virus threat. Saran, Cliff // Computer Weekly;9/6/2005, p10 

    This article reports that the information technology security consultancy F.Secure has issued an alert regarding a virus that targets mobile devices. Called Commwarrior-B, it affected one of F.Secure's clients in Scandinavia. Increasingly, sensitive corporate data is being held on mobile phones,...

  • Preventing data drain. Rapoza, Jim // eWeek;12/6/2004, Vol. 21 Issue 49, p51 

    This article reports that cell phones incorporate more and more true computing features while leveraging faster and faster wireless networks. True enterprise business applications can be logged in to and used effectively from PDAs and many phones. Workers can be productive no matter where they...

  • The need for device-based security is higher than ever. Gallant, Robert // Portable Design;Jan2005, Vol. 11 Issue 1, p24 

    The article reports that as organizations become more reliant on wireless technologies--and individuals suffer the painful consequences of identity theft and other cyber crimes--the need for device-based security is obvious. Enterprises have their own needs, for instance, to securely extend the...

  • Russian trojan cited as proof-of-concept threat to mobile security. Carson, Phil // RCR Wireless News;3/6/2006, Vol. 25 Issue 10, p7 

    The article focuses on the threats posed by the proof-of-concept malware Redbrowser.A to mobile telephone security. The malware required repeated permissions from the end user to activate it and could be easily thwarted by being ignored. Cingular Wireless L.L.C. notify pertinent subscribers of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics