Skip to main content

Home/ CSIA 459/ Group items tagged mobile

Rss Feed Group items tagged

James Thomas

11 best best practices for mobile device management - 0 views

  •  
    This article discusses 11 best best practices for mobile device management of mobile devices and identifies ways an organization can use these practices to improve network security while using mobile devices.
cpanagopulos

Status - mobile wallets utilizing near field communication (NFC) technology. - 1 views

  •  
    This publication outlines the various companies that are offering "mobile wallets" as a payment option. The authors describe Google and Visa as leading the industry as companies who are leading the way with NFC technology implementation. Also discussed is state of acquisitions between the major credit companies and competing mobile wallet platforms.
Vickye F

http://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf - 0 views

  •  
    This website gives information about Cyber Threats to Mobile Phones. The US-CERT provides valuable information on this site concerning recent threats.
Kerry Tam

Mobile Security: Finally a serious problem? - 1 views

  •  
    Article from UMUC's library on mobile security
Kerry Tam

Symbian 'vulnerability' and mobile threats - 0 views

  •  
    A study I found at UMUC's library how mobile OS are attacked by hackers and what methods they use to access OS
Michael Austin

NFC Phones Raise Opportunities, Privacy And Security Issues - 1 views

  •  
    An article detailing the privacy concerns regarding mass implementation of NFC technology in mobile devices.
  • ...1 more comment...
  •  
    Michael, privacy is just going to become more and more of an issue as time goes on. Good post. Ben
  •  
    Michael & Ben, Did you know that iPhone 5 passed on Near-Field Communication Data Sharing while Samsung, Nokia and HTC didn't ? Article: Android Embraces, iPhone 5 Passes on Near-Field Communication Data Sharing http://www.scientificamerican.com/article.cfm?id=near-field-communication-security-purchase Sam Rios
  •  
    Hi Sam, I had noticed that the iPhone 5 wasn't using NFC. I didn't research it further though, as I honestly don't care for Apple products (way overpriced imho). There are numerous reasons Apple may not want to use NFC, which could be anything from them having a competing technology and not wanting it to prosper to them simply not seeing the value the technology in its current implementation (it is still in its infancy in some respects). I found a site which was able to list numerous reasons NFC is lagging behind: http://news.cnet.com/8301-1035_3-57441842-94/is-nfc-killing-google-wallet/ ~Mike
James Thomas

Improving Co-located Collaboration through Intergrating Mobile Devices and Interactive ... - 0 views

  •  
    This article is based on a study conducted to observe and document human collaborative interaction using mobile devices and interactive surfaces.
Vickye F

Protecting Health Information on Mobile Devices - 0 views

  •  
    Vickye, Thanks for posting the article. As mobile devices continue to expand into the medical industry, this will definitely become a serious issue.
James Thomas

The future of business collaboration - 0 views

  •  
    This article discusses how businesses relate to mobile collaboration and issues that address its use in the mobile community
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
cpanagopulos

Mobile near field communications: tap n' go, keep it secure and private - 1 views

  •  
    This publication focuses on the security risks of NFC technology. Also discussed are the methods being developed to mitigate these risks.
Ken Ripley

Malware goes mobile - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
Phil Kemp

[Short Paper] Understanding the user experience of secure - 1 views

  •  
    Source 1 of 5 for my Annotated bibliography. I know we don't have to post anymore, but figured I would incase someone else may want to read, or gather information.
James Thomas

Leveraging Mobile Context for Effective Collaboration and Task Management - 0 views

  •  
    Collaboration in a moment of crisis
Vickye F

Declaratively programming the mobile web with Mobl - 1 views

  •  
    annotated bibliography
Phil Kemp

Hacker says phone app could hijack plane - 0 views

  •  
    Interesting article about an app that has been specifically designed to take control of an airplane.
cpanagopulos

Near field communication: Transforming transactions - 2 views

  •  
    This publication describes the various applications and the future possibilities of Near Field Communication in the mobile market.
LaToya White

Priorities for Research on Current and Emerging Network Trends - 1 views

  •  
    This study and report was generated by a collaborative group of experts under the European Network and Information Security Agency (ENISA) umbrella. Five areas have been assessed as presenting the biggest need for research within a window of three to five years: cloud computing, real-time detection and diagnosis systems, future wireless networks, sensor networks, and supply chain integrity. This article interested me because as cyber security professionals, it's important to adopt a global mentality when researching technology and security solutions.
  •  
    Good source for all kinds of information. One topic which interested me from this site was privacy in online tracking. I feel this is especially important with social media and societies growing dependence on mobile technologies. Google and Facebook tap into many sources to include your location, cookies, likes, etc...They amount of information they mine is scary sometimes.
Lee Bry

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments - 1 views

  •  
    Other applications of cloaking other than hiding information during transmission, is the hiding of communication source location(s); knowing where the communications are happening is a real threat for communicators. Spatial cloaking, ability to hide physical objects, in this instance loosely used, provides the ability to keep peer-to-peer (P2P) communication sources anonymous with regards to geographic constraints; however, temporal cloaking is also employed to hide a person's whereabouts during specified times.
1 - 20 of 20
Showing 20 items per page