smart phones

Smartphones Gain Traction as a Health IT Solution, Despite Concerns

Mobile devices such as smartphones and tablets are increasingly used by nurses in hospital settings, despite security and privacy concerns.

Apple, Samsung, others urged to help thwart mobile phone thefts

The attorney general pointed to a rise in the theft of phones and other mobile devices in a practice known as "Apple picking." Criminals steal the phones, wipe them clean, and then resell them on the black market. Sometimes the thefts turn violent; Schneiderman cited just a few examples in which cell phone owners were mugged, stabbed, or even killed.

iPhone has most vulnerabilities, so why is Android the most attacked?

Android’s market share and the openness of the operating system have made it the “go-to platform of malware authors,” according to Symantec research. Although the Apple iOS accounted for 93 percent of reported mobile vulnerabilities in 2012, Android accounted for 97 percent of threats. 

Officials warn students of laptop theft

“For some reason being around students at the library, I assume people would be civil and such,” he said. “It makes you remember that Alexander is not a student-only library, but a public one and anyone can come in and out.” But RUPD made Alexander Library a priority in terms of patrol, Cop said. Public safety personnel were also assigned to distribute informational materials about the consequences of leaving property unattended. At least 15 laptops were stolen from University libraries last semester, said Jeff Teichmann, a library supervisor at Alexander Library, where most of the thefts took place. Cop said most thefts occurred when items were left unattended.

2013 Mobile Security, Payments Outlook

For the nascent mobile payments marketplace to expand as projected, Javelin contends, financial institutions, merchants, device manufacturers and mobile wallet service providers must work together with mobile users to ensure a more secure user experience.

Senate legislation targets cyberstalking software

The Senate Judiciary Committee was expected Thursday to approve legislation that would close a legal loophole that allows so-called cyberstalking apps to operate secretly on a cellphone and transmit the user's location information without a person's knowledge.

Mobile users get no clue they're visiting malicious sites

Mobile browsers can use security features such as Secure Sockets Layer and Transport Layer Security. But you might not know if these features are in operation because the lock logo or HTTPS we see in the URL window of a desktop browser might not be there on your smart phone. “The drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use and consistency of the security indicators and certificate information that alert users of site identity and the presence of strong cryptographic algorithms,” according to a Georgia Tech-led team of researchers.

Smart Phone Malware Risk Rises

 
Mobile malware is exploding at a time when financial institutions are increasing their mobile banking offerings and consumers are making broader use of smart phones and tablets. A recent study from software and security firm Trend Micro finds that mobile malware attacks hit record numbers in the third quarter, with Android devices as the primary targets.
 

Mobile Revolution Threatens IT Security

The more mobile devices that enter an enterprise, the worse its information security gets. A study by the security firm Check Point shows the rising risks imposed on companies by a flood of iPhones, iPads, and other smart devices. Part of the problem lies with the security of the devices themselves, part with their portable nature, and part with the habits and focus of users. Still, mobile usage seems likely to become even more pervasive in the years ahead, so companies need to get their acts together on the next wave of security procedures

Tips for Encrypting Mobile Devices

To help prevent breaches, mobile devices  should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates. "Even with the best of intentions, and the most technically enforced policy, a ban for putting sensitive information on mobile devices is probably not going to be 100 percent effective," the attorney contends. That's because all mobile devices enable users to enter data and to receive e-mails that may, in some cases, contain sensitive information.

Syndicate content