TITLE

Survey reveals increasing risk of sloppy mobile security habits

PUB. DATE
August 2005
SOURCE
Credit Control;2005, Vol. 26 Issue 8, p47
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the increasing risk of sloppy mobile security habits in Great Britain, according to "The Mobile Usage Survey 2005." The survey found that 30 percent of mobile device users do not use passwords or any other security protection. And yet, three out of ten use mobile devices to store their PIN numbers, passwords and other information.
ACCESSION #
19780315

 

Related Articles

  • Performance Tuning of Data Transfer in Vehicular Networks. Dinakaran, M.; Balasubramanie, P. // International Journal of Computer Science Issues (IJCSI);Jan2012, Vol. 9 Issue 1, p350 

    Uninterrupted connectivity to Internet services during mobility is an increased demand nowadays. When a user is traveling through a vehicle like car or train, it is important to have a continuous Internet connection without connection break-ups and data losses. This vehicular Internet...

  • An Index Structure Framework to Analyze Host Mobility Supports for Integrated Networks. Yujia Zhai; Yue Wang; Jian Yuan; Yong Ren; Xiuming Shan // Journal of Networks;Feb2009, Vol. 4 Issue 1, p53 

    Convergence is a key design aspect for next generation networks. Developing a general mobility management model is an important requirement for the integrated mobile networks. This paper begins with a survey of mobility management concept. Based on the analysis and comparison, we present a...

  • BY THE NUMBERS.  // Wireless Review;Jul2005, Vol. 22 Issue 7, p13 

    Provides information on a survey in the field of wireless communication and telecommunication in the U.S. as of July 2005. Monthly charge from Zoie for watching movies on handsets; Percentage of all enterprise mobile devices that will be infected with viruses by the end of 2007; Number of...

  • Cell phones top list of 'on the go' CFOs.  // New Hampshire Business Review;8/9/2002, Vol. 24 Issue 17, p21A 

    Focuses on a survey which revealed preference of financial executives for mobile electronic devices. Background on the survey; Reasons for choosing cell phones; Other favorite electronic devices.

  • Mobile Device - Where Logical and Physical Come Together. Shabanova, Katia; Laundenslager, Krishna // Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p64 

    The article focuses on new portable mobile devices that offer the combine functionality of a mobile phone, computer, address book and photo, and video camera. It says that with these new devices, mobile users can secure information such as security data, bank account numbers and passwords, as...

  • Protect mobile device data.  // Communications News;Oct2003, Vol. 40 Issue 10, p6 

    Stresses the importance of protecting mobile device data. Incidence in which a company gains a vested interest in protecting mobile device data; Steps to take when a device is lost or stolen; Benefits from device-management solutions.

  • A secure authenticated group key agreement protocol for resource-limited mobile devices. Yuh-Min Tseng // Computer Journal;2007, Vol. 50 Issue 1, p41 

    With rapid growth of mobile wireless networks, many mobile applications have received significant attention. However, security will be an important factor for their full adoption. Most security technologies currently deployed in wired networks are not fully applicable to wireless networks...

  • Mobile Devices Leak Business Secrets.  // International Journal of Micrographics & Optical Technology;2006, Vol. 24, p2 

    The article focuses on a report from the Info-Tech Research Group which urges information technology managers to sanitize data on mobile devices before re-deploying them. The recommendation is aimed at preventing sensitive information from ending up in all the wrong places. One way to protect...

  • Trojan hits Windows PDAs for first time. Bedbarz, Ann // Network World;8/9/2004, Vol. 21 Issue 32, p1 

    After finding the third malicious program targeting wireless devices in fewer than 60 days, security specialists are warning that it is only a matter of time before attackers will launch a serious attack against mobile telephones and personal digital assistants (PDA). Malicious programs...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics