679 Results
Robert Siciliano Security Analyst at Safr.me
You may have heard the term jailbreaking or rooting in regards to your mobile phone, but what is this and what does it really mean for you? Jailbreaking is the process of removing the limitations imposed by Apple and associated carriers on devices running the iOS operating system. To “jailbreak” means to allow the phone’s owner to gain full access ...
28 July 2012 /security /regulation
The day after you get your shiny new mobile or tablet, chances are you’ll take it right to work and request the IT department to set it up with your work email and allow access to the company network. “Bring your own device” (BYOD) has become widely adopted to refer to workers bringing their personal mobile devices, such as smartphones, tablets an...
Some say there will be a day when the wallet you carry in your pocket or purse will become obsolete. The plan is to eliminate all our credit cards, store cards, and IDs and use our mobile phones as our primary means of commerce and identification. The technology behind mobile wallet or mobile POS (point of sale) basically turns your smartphone int...
11 July 2012 /security /regulation
As reported in March, the FBI has uncovered a network of rogue DNS servers and has taken steps to disable them. DNS (Domain Name System) is an Internet service that converts user-friendly domain names into the numerical Internet protocol (IP) addresses that computers use to talk to each other. When you enter a domain name, such as www.fbi.gov, in ...
07 July 2012 /security /regulation
Wi-Fi is everywhere. Whether you travel for business or simply need Internet access while out and about, your options are plentiful. You can sign on at airports, hotels, coffee shops, fast food restaurants, and now, even airplanes. Wi-Fi wasn’t born to be secure; it was born to be convenient. Wireless networks broadcast messages using radio and are...
04 July 2012 /security /regulation
Spammers send unwanted emails or texts that are both annoying and frightening. Most spam messages are useless advertisements selling stuff you don’t need or want. In 1995, 8,069 unique pieces of malware were detected. One out of 20 emails were spam, and the Melissa virus infected hundreds of thousands. By 2010, 54 million unique pieces of malware ...
01 June 2012 /security /regulation
Go through your smartphone right now. Look at each app and seriously consider whether you need it. If not, delete it. Then, determine which of the free apps are worth upgrading to the paid versions, since free apps that contain advertising that puts an additional drain on your battery. Using a special energy-profiling tool, researchers from Micro...
27 May 2012 /security /regulation
A “Logic Bomb” isn’t really logical, it’s a virus, designed to take down your corporate network and disable existing systems that may monitor data, protect it, back it up or access it. A logic bomb is designed to multiply like any virus and spread throughout a network multiplying its effects. In a Wall Street Journal story an example provided, dep...
24 May 2012 /security /regulation
Hacking a business Twitter account seems to be a favorite pastime for those wanting some kind of retribution and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either. In the past year NBC, Fox News, USA Today and a CNN anch...
30 April 2012 /security /regulation
Charges on corporate credit cards can often go unnoticed even when employees are submitting expense reports. Especially if the charges are small. The Federal Trade Commission filed a lawsuit describing a criminal enterprise responsible for “micro charges,” fraudulent charges ranging from 20 cents to $10, to as many as one million credit cards since...
27 April 2012 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.