Mobile devices such as smartphones and tablets are increasingly used by nurses in hospital settings, despite security and privacy concerns.
The attorney general pointed to a rise in the theft of phones and other mobile devices in a practice known as "Apple picking." Criminals steal the phones, wipe them clean, and then resell them on the black market. Sometimes the thefts turn violent; Schneiderman cited just a few examples in which cell phone owners were mugged, stabbed, or even killed.
Android’s market share and the openness of the operating system have made it the “go-to platform of malware authors,” according to Symantec research. Although the Apple iOS accounted for 93 percent of reported mobile vulnerabilities in 2012, Android accounted for 97 percent of threats.
“For some reason being around students at the library, I assume people would be civil and such,” he said. “It makes you remember that Alexander is not a student-only library, but a public one and anyone can come in and out.” But RUPD made Alexander Library a priority in terms of patrol, Cop said. Public safety personnel were also assigned to distribute informational materials about the consequences of leaving property unattended. At least 15 laptops were stolen from University libraries last semester, said Jeff Teichmann, a library supervisor at Alexander Library, where most of the thefts took place. Cop said most thefts occurred when items were left unattended.
For the nascent mobile payments marketplace to expand as projected, Javelin contends, financial institutions, merchants, device manufacturers and mobile wallet service providers must work together with mobile users to ensure a more secure user experience.
The Senate Judiciary Committee was expected Thursday to approve legislation that would close a legal loophole that allows so-called cyberstalking apps to operate secretly on a cellphone and transmit the user's location information without a person's knowledge.
Mobile browsers can use security features such as Secure Sockets Layer and Transport Layer Security. But you might not know if these features are in operation because the lock logo or HTTPS we see in the URL window of a desktop browser might not be there on your smart phone. “The drastic reduction in screen size and the accompanying reorganization of screen real estate significantly changes the use and consistency of the security indicators and certificate information that alert users of site identity and the presence of strong cryptographic algorithms,” according to a Georgia Tech-led team of researchers.
Mobile malware is exploding at a time when financial institutions are increasing their mobile banking offerings and consumers are making broader use of smart phones and tablets. A recent study from software and security firm Trend Micro finds that mobile malware attacks hit record numbers in the third quarter, with Android devices as the primary targets.
The more mobile devices that enter an enterprise, the worse its information security gets. A study by the security firm Check Point shows the rising risks imposed on companies by a flood of iPhones, iPads, and other smart devices. Part of the problem lies with the security of the devices themselves, part with their portable nature, and part with the habits and focus of users. Still, mobile usage seems likely to become even more pervasive in the years ahead, so companies need to get their acts together on the next wave of security procedures
To help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates. "Even with the best of intentions, and the most technically enforced policy, a ban for putting sensitive information on mobile devices is probably not going to be 100 percent effective," the attorney contends. That's because all mobile devices enable users to enter data and to receive e-mails that may, in some cases, contain sensitive information.