TITLE

Cellphone THEFT

AUTHOR(S)
BROWN, RACHEL
PUB. DATE
March 2013
SOURCE
Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged to take include creating a back up for important information, setting up passwords on their phones, and using security applications like remote tracking, remote wiping, and Apple iCloud.
ACCESSION #
94947771

 

Related Articles

  • Mobile phone security models to be unveiled in Barcelona. Montgomery, Angus // Design Week;2/11/2010, Vol. 25 Issue 6, p4 

    The article focuses on the three prototypes that were designed to secure mobile phones against thieves and fraudsters developed in the Mobile Phone Security Challenge. The projects include Touch Safe prototype which has a key card wherein user swipes their phone to unlock the phone's ability to...

  • 5 'best practices' for mobile device management. TRUDEL, JEFF // New Hampshire Business Review;6/10/2016, Vol. 38 Issue 12, p20 

    The article offers suggestions for mobile device management including creating a policy for mobile devices in the workplace, enabling full device encryption causing little risk of data being accessed in case of device theft and ensuring a data backup.

  • The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission. Rui Zhang; Jian Wei Wang; Yaobin Xie; Lizhong Wang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p1380 

    The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth...

  • NEW SECURITY THREATS TARGET CELL PHONES, MOBILE DEVICES. Villano, Matt; Follett, Jennifer Hagendorf // CRN;3/21/2005, Issue 1138, p45 

    Addresses the emergence of security threats targeting cellular phones as of March 2005. Information on the Cabir virus that originated from the Philippines; Reason for considering the BlackBerry product from Research In Motion as a potential risk for customers; Methods that increase the risks...

  • Verizon to support tablets and personal devices.  // RBOC Update;Jun2011, Vol. 22 Issue 6, p3 

    The article reports that Verizon Communications Inc. has added new management and security capabilities for both corporate and employee-owned mobile devices to its Managed Mobility portfolio in 2011, as well as an on-device portal to allow mobile workers to obtain required business applications....

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • Securing your mobile world. Curran, Kevin // Multimedia Information & Technology;May2014, Vol. 40 Issue 2, p34 

    The article presents the author's recommendations on how to protect personal information contained in mobile devices. Topics discussed include the use of a security code to prevent unauthorized access of mobile devices and acquiring legitimate mobile applications from official online stores. The...

  • Mobile VAS--from fantasy to reality. Chanay, Xavier // Telecommunications - International Edition;Feb2001, Vol. 35 Issue 2, p102 

    Discusses wireless telecommunication operators' ability to have value added service (VAS) interoperability by using security identity module (SIM) toolkit and javacard. Shortening of marketing time; Reduction of cost and risk; Impact of javacard technology on the SIM card market; Ramifications...

  • Mobile Security--A Work In Progress. Finneran, Michael // Business Communications Review;Nov2006, Vol. 36 Issue 11, p18 

    The article discusses the challenges of wireless phone security. As technology increases, maintaining secure wireless devices is becoming increasingly complex. The four aspects of mobile security--privacy, authentication, veracity and network/device availability--are related. The unique...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics