Mobile Security: A Market Set to Soar

Hulme, George
March 2009
CRN;Mar2009 Channel Advisor, p10
The article focuses on the importance of security protection for smartphones and mobile storage media in the U.S. The threats to confidential information stored on mobile devices are increasing and assures that the probability that hackers will start crafting it is also high. In response, leading security manufacturers have released products to protect smartphones including Norton Smartphone Security, Trend Micro Mobile Security, and F-Secure Mobile Security from Symantec Corp.


Related Articles

  • NEW SECURITY THREATS TARGET CELL PHONES, MOBILE DEVICES. Villano, Matt; Follett, Jennifer Hagendorf // CRN;3/21/2005, Issue 1138, p45 

    Addresses the emergence of security threats targeting cellular phones as of March 2005. Information on the Cabir virus that originated from the Philippines; Reason for considering the BlackBerry product from Research In Motion as a potential risk for customers; Methods that increase the risks...

  • Phone data used for fraud.  // Choice;Feb2009, p4 

    The article reports on the risk of personal fraud from discarded mobile phone. It states that industry experts have warned that smartphones and multifunction devices that store information on the device can pose a security risk. According to senior vice president of Sims Recycling Solutions...

  • Cellphone THEFT. BROWN, RACHEL // Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19 

    The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged...

  • The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission. Rui Zhang; Jian Wei Wang; Yaobin Xie; Lizhong Wang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p1380 

    The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth...

  • Verizon to support tablets and personal devices.  // RBOC Update;Jun2011, Vol. 22 Issue 6, p3 

    The article reports that Verizon Communications Inc. has added new management and security capabilities for both corporate and employee-owned mobile devices to its Managed Mobility portfolio in 2011, as well as an on-device portal to allow mobile workers to obtain required business applications....

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization. Park, Su-Wan; Lim, JaeDeok; Kim, Jeong Nyeo // International Journal of Distributed Sensor Networks;2/28/2015, Vol. 2015, p1 

    Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. In this...

  • Ultraprivate Smartphones. Talbot, David // MIT Technology Review;May/Jun2014, Vol. 117 Issue 3, p34 

    The article discusses research into smartphones with special emphasis on security and privacy, focusing on the Blackphone developed by cryptologist Phil Zimmerman of the encryption company Silent Circle. Topics include the growing public awareness of data security through media coverage of...

  • Dial M for missing. Twentyman, Jessica // SC Magazine: For IT Security Professionals (UK Edition);Feb2009, p20 

    The article discusses security risks associated with the use of mobile devices by employees. Information technology (IT) security professionals are advised to consider the vulnerability of smartphones to loss or theft, which leads to the theft and loss of sensitive data, as well as their ability...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics