By Daniel V. Hoffman
This present day, it's virtually very unlikely to do company with out a cellular phone and a BlackBerry or PDA. those units are the lifeline for firms huge and small-and no one is familiar with this greater than a hacker. regularly, safeguard for cellular units has held a low precedence. Now, a professional moral hacker explains during this ebook why this needs to swap and the way to alter it. full of sobering examples of tangible assaults, this special source exhibits you ways to mount your counterattack.
Read or Download Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise PDF
Similar comptia books
The e-book does a very good activity of masking approximately 70 percentage of the particular examination. the opposite 30 percentage (SmartDefense) isn't really even pointed out.
Dealing with TCP/IP Networks concepts, instruments and safeguard concerns Gilbert Held 4-Degree Consulting, Macon, Georgia, united states * makes a speciality of the concepts, instruments, diagnostic trying out, and safeguard. * Addresses the sensible tips on how to deal with a TCP/IP community. * is helping readers to control and regulate operation and usage.
Corporation community directors are pressured this present day to aggressively pursue a strong community protection regime. This publication goals to provide the reader a powerful, multi-disciplinary realizing of the way to pursue this target. This specialist quantity introduces the technical concerns surrounding safeguard in addition to how safety guidelines are formulated on the govt point and communicated through the association.
The area extensive net has develop into a advertisement venue for firms, hence elevating the stakes for defense. an easy safeguard oversight can rate an organization hundreds of thousands of greenbacks! Java is the main ordinary programming language on the internet. Java protection promises the keys to preserving your site and fighting a disastrous assault in your enterprise.
Extra resources for Blackjacking: Security Threats to Blackberry, PDA's, and Cell Phones in the Enterprise
As long as the company didn’t have to pay for the PDAs, they didn’t really care. The company’s concern was with cost, not security. Armed with their new PDAs, the employees used them to connect to the Internet. At first it was to wireless LAN, then to public Wi-Fi hotspots. The advent of code division multiple access (CDMA) and EvDO cards enabled these users to employ their PDAs to get on the Internet from just about anywhere. There still wasn’t a huge security concern even though sensitive data was undoubtedly on these devices and they were routinely being connected to the Internet without any enterprise security policies, controls, or technologies.
His work PC now has the nasty worm. Because it’s a worm, it doesn’t require any human interaction to spread. The worm propagates to other PCs on the network and before long, the corporation has a major outbreak. 8 illustrates how this process takes place. 1. User synchs PDA with work computer 3. User synchs PDA with work computer, transferring worm to work computer 2. User synchs PDA with home computer, which has a worm that is transferred to PDA 4. 8 is very common and bypasses the aforementioned network-based antivirus solutions.
The ability to check the score of the Cubs game from a cell phone is certainly useful, and fairly simple. But taking it to the next level — utilizing a mobile device for corporate activities — often requires that an infrastructure be implemented or modified back at the corporate location. This possesses its own set of problems. I know of a company that didn’t really embrace the idea of using mobile devices. They provided their remote users with laptops and Internet connectivity from just about anywhere, and that was it.