TITLE

Stolen Phones Sound Off

AUTHOR(S)
Stauder, Libby York
PUB. DATE
October 2006
SOURCE
Wireless Week;10/1/2006, Vol. 12 Issue 20, p38
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article talks about Mobile Manager, a new service from Synchronica that lets a mobile phone owner know that his phone is stolen. The service is a web-based application that provides over-the-air control of mobile phones. It can remotely lock and wipe data from cell phones as soon as they are reported missing and can trigger the devices to emit ongoing screams to scare the thief. The device is no longer usable for placing calls or accessing stored data, once an IT administrator activates the lock feature.
ACCESSION #
22688253

 

Related Articles

  • Mobile phone security models to be unveiled in Barcelona. Montgomery, Angus // Design Week;2/11/2010, Vol. 25 Issue 6, p4 

    The article focuses on the three prototypes that were designed to secure mobile phones against thieves and fraudsters developed in the Mobile Phone Security Challenge. The projects include Touch Safe prototype which has a key card wherein user swipes their phone to unlock the phone's ability to...

  • Cellphone THEFT. BROWN, RACHEL // Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19 

    The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged...

  • Securing your mobile world. Curran, Kevin // Multimedia Information & Technology;May2014, Vol. 40 Issue 2, p34 

    The article presents the author's recommendations on how to protect personal information contained in mobile devices. Topics discussed include the use of a security code to prevent unauthorized access of mobile devices and acquiring legitimate mobile applications from official online stores. The...

  • The Technology Generations Take on Data Security.  // Information Security;May2014, Vol. 16 Issue 4, p10 

    The article presents several charts related to different generations' use of technology, which includes the percentage of Millennials and Gen X who uses a password on their mobile phone, the percentage of people who uses two-factor authentication on their online accounts and the percentage of...

  • MIXED REACTION.  // In These Times;May2015, Vol. 39 Issue 5, p6 

    The article presents statistics related to percentage of U.S. police departments using license plate reader, use of stingrays by North Carolina county police on monitoring the cell phones, and number of video footage by surveillance cameras in U.S. along with a fact on haymarket riots.

  • U.S. Electronic Security Products and Systems Demand.  // SDM: Security Distributing & Marketing;Jul2004, Vol. 34 Issue 7, p15 

    Compares the demand for electronic security products and systems in the United States. Alarm systems; Access control systems; Closed-circuit television; Electronic article surveillance; Contraband detection; Automotive security systems.

  • 3 Tips for Combating Mobile Shopping Cart Abandonment. Desai, Rodger // Multichannel Merchant Exclusive Insight;8/29/2012, p2 

    The article offers three tips how to prevent mobile cart abandonment in the U.S. It suggests optimizing of one's web site for mobile devices by limiting the text, focus on web pages, and ensure computer security. It mentions some ways to better communicate and how to enforce security for mobile...

  • Design of Lock Based Authentication System for Android Smartphone user. Jadhav, Meera; Anuradha, U.; Bilwashree, H.; Vani, B. // International Journal of Advanced Research in Computer Science;Jul-Aug2014, Vol. 5 Issue 6, p125 

    Smart phones have been vigorously & widely used in recent years due to their capabilities of supporting many applications from simple SMS to complicated location based services. It is challenging for smart phones developers to manage & protect privacy or sensitive data of the end users. Almost...

  • Study finds mobile devices can threaten corporate networks. Nichols, Mike // Grand Rapids Business Journal;9/21/2015, Vol. 33 Issue 38, p5 

    The article highlights a study released by Ann Arbor, Michigan-based cloud-access security provider Duo Security which revealed that outdated mobile devices pose significant security risk to corporate networks and enterprise information technology (IT) departments. It cites the vulnerabilities...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics