IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Handheld Device Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Mobile Device Security, Wireless Handheld Device Security, Enterprise Device Security, Handheld Security, Device Security, PDA Security, Wireless Data Security
DEFINITION: SMiShing is a security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his cellular phone or other mobile device. SMiShing is short for "SMS phishing." David Rayhawk, senior researcher at McAfee Avert Labs, explains how SMiShing works in a blog post entitled 'SMiShing - an emerging threat vector:'"Some cell phone users have started receiving SMS messages  … 
Definition continues below.
Handheld Device Security White Papers (View All Report Types)
26 - 50 of 57 Matches Previous Page  |  Next Page
Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

Websense, Inc.

Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization
sponsored by Bradford Networks
WHITE PAPER: With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more challenging to manage and more at-risk every day. In this paper, explore this increasing issue, and how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
Posted: 15 Dec 2011 | Published: 15 Dec 2011

Bradford Networks

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Websense, Inc.

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011


Downloading Mobile Apps is Risky Business
sponsored by Intel Security
WHITE PAPER: Learn how downloading mobile apps could introduce client-side vulnerabilities.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
sponsored by Intel Security
WHITE PAPER: For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure
sponsored by Intel Security
WHITE PAPER: This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Say “Yes” to Mobile Devices
sponsored by Intel Security
WHITE PAPER: Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security
sponsored by Intel Security
WHITE PAPER: In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Hyper-Mobility meets Security in the corporate environment
sponsored by Kaspersky Lab
WHITE PAPER: The use of mobile devices in the enterprise is on the rise as it enables employees to be more productive. But this new trend does not come without risk. View this paper now to explore the key threats of mobile device usage and discover how to ensure complete protection with Kaspersky Endpoint Security for Smartphone.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky Lab

Picking a Sensible Mobile Password Policy
sponsored by Perimeter eSecurity
WHITE PAPER: This paper recommends a passcode policy for mobile devices that is reasonable, user-friendly, highly usable, but still strong enough to protect your company’s data.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011


Bring Your Own iPad to Work
sponsored by Aruba Networks, Inc.
WHITE PAPER: Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Aruba Networks, Inc.

Ensuring The Availability of Blackberry Enterprise Server
sponsored by Double-Take Software
WHITE PAPER: In order to implement a plan for protecting and backing up BlackBerry handhelds, it's important to understand how the Blackberry Enterprise Server solution works within an existing email environment. This paper gives a quick lessong to that end, then concentrates on ensuring the availability of the Blackberry Enterprise Server
Posted: 16 Nov 2009 | Published: 16 Oct 2009

Double-Take Software

Increasing the ROI of Mobility
sponsored by Sybase, an SAP company
WHITE PAPER: Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.
Posted: 08 May 2009 | Published: 08 May 2009

Sybase, an SAP company

Best Practices for Managing Your BlackBerry Environment
sponsored by BlackBerry
WHITE PAPER: This reference document will provide you with detailed information on how to effectively manage your BlackBerry Enterprise Server architecture.
Posted: 18 Mar 2009 | Published: 18 Mar 2009


CRM for the Professional on the Go
sponsored by BlackBerry
WHITE PAPER: Mobile CRM is something that needs to be considered now. As a business leader, you might have put it into your mental to do later box, but the reasons to make it a priority are compelling. Read this paper to discover why.
Posted: 01 Sep 2008 | Published: 25 Dec 2006


Best Practices for BlackBerry Administrators
sponsored by BlackBerry
WHITE PAPER: This whitepaper discusses best practices for managing your BlackBerry Enterprise Server running on Lotus Domino. Take a tour of the administrative features and tools that can make your job easier. This session is a must for any BlackBerry administrator.
Posted: 18 Aug 2008 | Published: 18 Aug 2008


Developing an Effective Corporate Mobile Policy
sponsored by BlackBerry
WHITE PAPER: By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing.
Posted: 19 Jun 2008 | Published: 01 Jun 2008


Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption
sponsored by BlackBerry
WHITE PAPER: This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.
Posted: 08 Nov 2007 | Published: 08 Nov 2007


Wireless Handheld Devices Become Trusted Network Devices
sponsored by Intel Corporation
WHITE PAPER: Read this white paper that details a new solution that allows employees to use their handheld device as a trusted device on the corporate network.
Posted: 31 Aug 2007 | Published: 01 Jan 2006

Intel Corporation

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere
26 - 50 of 57 Matches Previous Page    1 2 3    Next Page
HANDHELD DEVICE SECURITY DEFINITION (continued): …  along these lines: 'We're confirming you've signed up for our dating service. You will be charged $2/day unless you cancel your order:' (This is an example and was not a real url at the time of writing)This phenomena, which we at McAfee Avert Labs are dubbing "SMiShing" (phishing via SMS), is yet another indicator that cell phones and mobile devices are becoming increasingly used by perpetrators of malware, viruses and scams.While some might recognize this as a scam, many unsuspecting users would not. Fearful of incurring premium rates on their cell phone bill, they visit … 
Handheld Device Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement