IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless SecurityReports
51 - 75 of 238 Matches Previous Page  | Next Page
The 10 “must-haves” for secure enterprise mobility
sponsored by Citrix
WHITE PAPER: This whitepaper provides a security framework and evaluator's checklist you can use to make sure you are securing mobile devices and data properly, including the 10 "must haves" for secure enterprise mobility.
Posted: 26 Mar 2013 | Published: 28 Feb 2013

Citrix

Underexposed risks of public Wi-Fi hotspots
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Mobile Device Management Systems Help Mitigate BYOD Risks
sponsored by SearchSecurity.com
EGUIDE: This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix Systems, Inc.
WHITE PAPER: Businesses can't afford not to make mobile governance and security a top priority. Read this mobility whitepaper to learn the critical facts about mobile security and management, and what you can do to keep your organization secure.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Citrix Systems, Inc.

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

WLAN Planning For BYOD
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchNetworking.com explores the impact BYOD is having on the WLAN and what you need to do to provide a quality experience to your mobile users without compromising security or control.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

SearchSecurity.com

Tablets & Smartphones in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.
Posted: 28 Jan 2013 | Published: 01 Jan 2013

SearchSecurity.com

Managing Mobile Application Security in the BYO Device Era
sponsored by SearchSecurity.com
EGUIDE: Smartphone success can be greatly attributed to mobile applications. Unfortunately, just as mobile app usage increases, so does the prevalence of malware. Is your organization ready to manage mobile app security in a BYOD world? If not, read this expert E-Guide now!
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

BYOD Security Policy Considerations and Best Practices
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

SearchSecurity.com

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by SearchSecurity.com
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Wireless LAN ITDC - Checklist #3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchNetworking.com's three-part guide on wireless products. This expert asset takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing a wireless solution.
Posted: 23 Oct 2012 | Published: 23 Oct 2012

SearchSecurity.com

Tackling Top Wireless Challenges and Debunking Common Myths: Expert Roadmap
sponsored by ADTRAN, Inc.
EGUIDE: This E-Guide from SearchNetworking.com explores the myths associated with cloud-managed WLANs and aims to help you understand what you can truly expect from these service offerings.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

ADTRAN, Inc.

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com

Network Security Essential Guide
sponsored by SearchSecurity.com
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Network Evolution February 2013
sponsored by SearchNetworking.com
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SearchNetworking.com

Tutorial: Five Steps to Effective Wireless Networking in Healthcare
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com demonstrates how health IT administrators should plan, implement and manage wireless networks within their respected facilities. Read now for five steps to effective wireless networking in health care.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

HP & Intel®

HIT Managers Tackle Hospital Wireless Implementation Challenges
sponsored by HP & Intel®
EGUIDE: This e-guide outlines the challenges today's hospitals may encounter when implementing wireless networks. Inside, uncover expert tips and recommendations for creating a wireless network built for the long-term.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

HP & Intel®

Bring Your Own Design: Simplifying BYOD with Ruckus Wireless
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: Uncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

Ruckus Wireless

The CIO’s Guide to Building a Mobile Device Management Strategy – And How to Execute on It
sponsored by BlackBerry
WHITE PAPER: As the mobility trend continues to take over the business world, CIOs are left with the difficult task of figuring out the best way to manage the drastic increase in mobile users. Discover how mobile device management (MDM) strategies can enable you to improve mobile security, increase productivity, reduce TCO, and more.
Posted: 13 Sep 2012 | Published: 13 Sep 2012

BlackBerry

Mitigating Risk in a Mobile World
sponsored by Symantec Corporation
WHITE PAPER: Discover why flexible architectures – such as cloud-based security services – can help your organization enjoy the benefits of enterprise mobility by mitigating its inherent risks.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

Symantec Corporation

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Top 10 Reasons Enterprises Prefer Juniper Wireless
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover the ten characteristics and features any WLAN solution should offer to support the transformational trends your business is making and meet the many challenges of today's enterprises.
Posted: 21 Aug 2012 | Published: 31 Jul 2012

Juniper Networks, Inc.

10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks
51 - 75 of 238 Matches Previous Page    1 2 3 4 5 6    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement