Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
In my previous article in this series on mobile security, we discussed that the primary technique for getting access to a network secured by a WPA/WPA2 pre-shared key (the most common type, …
I've seen a number of articles this month about how Distributed Denial of Service (DDoS) attacks evolve through the use of mobile devices. I think the articles blur the lines on several …
In our last installment on this ongoing series about mobile device security risks, we talked about what could happen once an attacker gains access to the same network that their target is …
Over the ages, philosophers challenged the conventions of traditional thinking by meditating upon a “koan.” A koan is similar to a riddle, except that there is no punchline. It typically involves a …
Whenever you use a mobile device, you probably aren’t far from a cellular or WiFi connection. The apps on mobile devices are geared to interact with a range of content on the …