IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless SecurityReports
101 - 125 of 231 Matches Previous Page  | Next Page
Enabling Mobile Device Management from the Cloud
sponsored by Fiberlink
WHITE PAPER: This white paper examines the benefits to enterprises that make use of a comprehensive mobile device application management platform.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Fiberlink

The New Rules of Enterprise Mobility
sponsored by Fiberlink
WHITE PAPER: This white paper outlines the driving forces behind businesses establishing corporate application stores, the benefits of such an approach, and what to seek in a solution that supports this strategy.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Fiberlink

Mobile data protection best practices
sponsored by McAfee, Inc.
EGUIDE: Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

McAfee, Inc.

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Websense, Inc.

Top Mobile Data Protection Best Practices
sponsored by McAfee, Inc.
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Downloading Mobile Apps is Risky Business
sponsored by McAfee, Inc.
WHITE PAPER: Learn how downloading mobile apps could introduce client-side vulnerabilities.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
sponsored by McAfee, Inc.
WHITE PAPER: For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure
sponsored by McAfee, Inc.
WHITE PAPER: This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Hyper-Mobility meets Security in the corporate environment
sponsored by Kaspersky Lab
WHITE PAPER: The use of mobile devices in the enterprise is on the rise as it enables employees to be more productive. But this new trend does not come without risk. View this paper now to explore the key threats of mobile device usage and discover how to ensure complete protection with Kaspersky Endpoint Security for Smartphone.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky Lab

Choosing an Enterprise-Class Wireless Operating System: A Comparison of Android, BlackBerry, iPhone, and Windows Mobile
sponsored by BlackBerry
WHITE PAPER: When selecting a mobile computing platform, organizations have to keep security and manageability at the forefront of their considerations. Access this comprehensive resource to explore the key criteria in selecting, deploying and managing a mobile operating system.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

BlackBerry

Technical Guide on Mobile Security
sponsored by SearchSecurity.com
EGUIDE: Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Posted: 01 Nov 2011 | Published: 01 Nov 2011

SearchSecurity.com

AT&T Mobile Remote Access Services
sponsored by AT&T Corp
PRODUCT OVERVIEW: AT&T's Mobile Remote Access Services provides flexible, highly secure access to corporate assets for all users.
Posted: 21 Oct 2011 | Published: 21 Oct 2011

AT&T Corp

A Heuristic Approach to Mobile Security
sponsored by Zenprise
WHITE PAPER: This paper addresses the aspects of a new approach to mobile security management that is imperative if we are to keep up with the fast pace of change in mobile user demands and devices.
Posted: 20 Oct 2011 | Published: 20 Oct 2011

Zenprise

Mobile Remote access services from ATT Video
sponsored by AT&T Corp
WEBCAST: Mobile workers need access to the same tools and applications they use in the office. Mobile Remote Access Services (MRAS) from AT&T provide added security to help keep employees connected to the tools they need to be efficient and productive.
Posted: 13 Oct 2011 | Premiered: Oct 13, 2011

AT&T Corp

Wireless network management: Expert tip
sponsored by Cisco Systems, Inc.
EGUIDE: This expert E-Guide provides recommendations for improved wireless network management. Uncover tools that take applications into account when measuring WLAN performance and key tips for securing wireless networks for a small business.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Cisco Systems, Inc.

Mobile Applications Before and After
sponsored by AT&T Corp
ESSENTIAL GUIDE: This white paper takes a look at business processes before and after the use of mobile applications.
Posted: 04 Oct 2011 | Published: 04 Oct 2011

AT&T Corp

Expert Tips on Getting Mobile Securely with Virtual Desktops
sponsored by CDG
EGUIDE: In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices.
Posted: 30 Sep 2011 | Published: 30 Sep 2011

CDG

Bringing BYOD to Your Enterprise
sponsored by BlackBerry
EGUIDE: This expert E-Guide takes a close look at the benefits and challenges of BYOD. Uncover best practices to integrate BYOD into your mobility strategy and discover why mobile device management is still crucial.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

BlackBerry

Mobile Device Security Overview
sponsored by BlackBerry
EGUIDE: This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more.
Posted: 29 Sep 2011 | Published: 29 Sep 2011

BlackBerry

HKMP Case Study: BlackBerry Solution is on the Money for Accounting Firm
sponsored by BlackBerry
CASE STUDY: Access this case study to learn how an accounting firm used BlackBerry® smartphones to meet their needs for almost immediate communications, collaboration, document access and security.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

UT Dallas: University turns to smartphones for multi-year research project
sponsored by BlackBerry
CASE STUDY: UT Dallas’ Center for Children and Families has been conducting a study on adolescents’ social networks and their impact on development. To assist in data collection, the team chose BlackBerry® hosted solution from Ceryx based on its ability to provide a controlled environment for their research.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

BlackBerry

Introducing BlackBerry Balance™ Technology
sponsored by BlackBerry
WEBCAST: Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure.
Posted: 16 Sep 2011 | Premiered: Sep 16, 2011

BlackBerry

Maximizing Smartphone Value: A Guide for IT Admins
sponsored by BlackBerry
WHITE PAPER: As an IT administrator what steps can you take to help your organization benefit the most from the mobile revolution? This guide offers practical, fresh ideas to help you lower costs, maximize benefits and map a strategy.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

BlackBerry

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

GroupLogic
101 - 125 of 231 Matches Previous Page    3 4 5 6 7 8    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement