Surfing, Without a Leash

November 2009
Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p14
Trade Publication
The article reports on the survey conducted by Trend Micro Inc. to smartphone and iPhone users regarding the security of their phones in the U.S. The survey shows that 44 percent of the respondents believed that surfing the Internet using their smartphone is safe while only 23 percent of the users use security software. It also indicates that half of them have received spam electronic mail messages (e-mails) and 40 percent have accessed the universal resource locator (URL) link in an e-mail.


Related Articles

  • Phone data used for fraud.  // Choice;Feb2009, p4 

    The article reports on the risk of personal fraud from discarded mobile phone. It states that industry experts have warned that smartphones and multifunction devices that store information on the device can pose a security risk. According to senior vice president of Sims Recycling Solutions...

  • Smartphones new Swizz army knife.  // New Zealand Management;Sep2011, Vol. 58 Issue 8, p8 

    The article reports on the McKinsey & Co. research which reveals that smartphones are the users' device of choice for Web browsing, email, and product research, over personal computers (PC).

  • Lock Down Your Android Devices. Bradley, Tony // PCWorld;Jan2011, Vol. 29 Issue 1, p33 

    This article discusses how to ensure security of cellular telephones and smartphones that use the Android mobile operating system (OS). It stresses the need for security measures as the OS lacks the remote-tracking capability and the ability to impose standard sets of applications or other...

  • BlackBerry Says Voice Is Security's Final Frontier. Maisto, Michelle // eWeek;7/31/2014, p1 

    The article reports on Blackberry's voice security features on mobile phones with the acquisition of German firm Secusmart for its anti-eavesdropping solution useful for the government and health care markets. Blackberry also partnered with its customers like Nanthealth whose doctors can improve...

  • An Ounce of Prevention. Brandon, John // Inc.;Apr2011, Vol. 33 Issue 3, p41 

    The article previews various mobile applications that make smartphone safer include eyeD Biometric Password Manager, McAfee WaveSecure, and Android Pattern Lock.

  • Addressing Security and Privacy Risks in Mobile Applications. Jain, Anurag Kumar; Shanbhag, Devendra // IT Professional;Sep/Oct2012, Vol. 14 Issue 5, p28 

    Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation. Insecure mobile applications can cause serious information security and data privacy issues and can have severe repercussions on users and organizations alike.

  • Mobile Security Reality Check. Blessington, Heather // Motorcycle & Powersports News;Jun2013, Vol. 39 Issue 6, p24 

    The author focuses on the security of smart phones used by the Americans and the consequences after the mobile is been lost or stolen. She advices not to share the mobile phone lock combination with any person except the near family ones and keep it secret as Personal Identification Number (PIN)...

  • NEW SECURITY THREATS TARGET CELL PHONES, MOBILE DEVICES. Villano, Matt; Follett, Jennifer Hagendorf // CRN;3/21/2005, Issue 1138, p45 

    Addresses the emergence of security threats targeting cellular phones as of March 2005. Information on the Cabir virus that originated from the Philippines; Reason for considering the BlackBerry product from Research In Motion as a potential risk for customers; Methods that increase the risks...

  • Design of Lock Based Authentication System for Android Smartphone user. Jadhav, Meera; Anuradha, U.; Bilwashree, H.; Vani, B. // International Journal of Advanced Research in Computer Science;Jul-Aug2014, Vol. 5 Issue 6, p125 

    Smart phones have been vigorously & widely used in recent years due to their capabilities of supporting many applications from simple SMS to complicated location based services. It is challenging for smart phones developers to manage & protect privacy or sensitive data of the end users. Almost...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics