Why your mobile is at risk

Emm, David
November 2006
SC Magazine: For IT Security Professionals (UK Edition);Nov2006, p55
This article emphasizes that corporate data stored on mobile devices are vulnerable target for malware. This problem is magnified by the fact that workforces of most companies today are increasing becoming mobile taking with them more corporate data. The capacity of handheld computer is already comparable to the capacity of laptop computer. In 2004 the first worm for mobile phones appeared in the form of Cabir. Since then it spread to more than 40 countries using Bluetooth. At present there are around ten new mobile threats a week.


Related Articles

  • Tablet PCs. Quinn, Valens // Australian Personal Computer;May2004, Vol. 24 Issue 5, p100 

    Since its launch over a year ago, the Tablet PC has established itself as a credible new addition to the notebook form factor. Ideal for situations where a person needs to hold a notebook in one hand and enter data with the other, Tablet PCs provide this freedom through a pen-driven interface...

  • PLANS INTO ACTION. Kavanagh, John // Computer Weekly;9/13/2005, p52 

    This article reports that for businesses to run smoothly, there is a need of implementing mobile policies and procedures, and enforcing them. Chris Minchin, manager at the Federation Against Software Theft, says that it is essential that companies implement mobile policies and procedures, and...

  • Mobile Edge Unveils Monaco Notebook Case.  // TWICE: This Week in Consumer Electronics;1/29/2007, Vol. 22 Issue 3, p76 

    The article introduces the Monaco notebook case unveiled by Mobile Edge. The notebook case features a quilted microfiber exterior, poly-suede interior, stainless steel fittings and color-contrast stitching. It can accommodate notebooks with screens up to 16.4 inches. The product is not only...

  • PALM'S STRANGE LAPTOP. Fitchard, Kevin // Telephony;6/4/2007, Vol. 248 Issue 10, p30 

    The author reflects on Palm Inc.'s Foleo device personal computer laptop. He asserts that Foleo was not a laptop but a Linux powered laptop that can replicate the applications of Treo and other smartphones. Founder Jeff Hawkins of Palm Inc. has admitted on the unveiled what appeared to be a...

  • Wait to buy integrated wireless PCs, says Gartner. Saran, Cliff // Computer Weekly;4/4/2006, p14 

    This article reports on the advice given by analyst firm Gartner Group Inc. that users should avoid buying notebook PCs with integrated wireless technology until after 2008, due to the risk of wireless obsolescence. The analyst firm said that the third generation (3G) interface may become...

  • The beginning of the end for laptops? Saran, Cliff // Computer Weekly;10/10/2006, p20 

    The article highlights that mobile devices including smartphones, Blackberrys and Windows Mobile 5.0, are presenting a real alternative to traditional laptops and notebook personal computers. Ovum principal analyst Jeremy Green said that people could connect to networks much more easily than...

  • HAVE YOU SEEN THIS LOST PHONE?  // PCWorld;Nov2011, Vol. 29 Issue 11, p79 

    The article discusses on the latest developments in mobile devices security as of November 2011. It offers suggestions on how to ensure that files, contacts and other personal information are protected when a mobile device like smartphone, laptop and tablet is lost or stolen. It presents several...

  • DOWNTIME.  // Computer Weekly;5/8/2007, p40 

    The article talks about various situations involving laptop mobile computers in Great Britain. A ruggedized laptop, which had been run over by a Challenger tank while setting up a forward communications base during Desert Shield, is still functioning perfectly, although the case was a little...

  • Performance Evaluation of Modified AODV Protocol with DSR routing protocol In Presence of Black Hole Attack in Mobile Ad-hoc Network. Sharma, Romina; Shrivastava, Rajesh // International Journal of Advanced Research in Computer Science;May/Jun2013, Vol. 4 Issue 3, p63 

    A mobile ad-hoc network (MANET) is a non-infrastructure network that consists of self configuring mobile nodes connected by wireless links. In this network, mobile nodes are free to move in an open environment. Two nodes can communicate directly as long as they are within the radio communication...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics