All posts in PEDs

A Mobile botnet is described as a type of botnet that targets mobile devices, attempting to gain complete control of the device and its contents as well as providing control to the botnet originator. Based on research done by several top computer software security companies, mobile phone botnets are on the rise. Read more
Most people are unaware of how easily someone can hack into their cell phone. There are devices that allow someone (hacker) to hack into your cell phone by just dialing the number. With this technology, they can also listen to your calls, read your emails and texts, listen to the phone’s surroundings such as conversations going on in the room, gain access to your photos and your social media information or any other information stored on your phone. They can even retrieve your password to your online bank account. Read more
(Definition: (Radio Frequency IDentification) A data collection technology that uses electronic tags for storing data. The tag, also known as an "electronic label," "transponder" or "code plate," is made up of an RFID chip attached to an antenna. Transmitting in the kilohertz, megahertz and gigahertz ranges, tags may be battery-powered or derive their power from the RF waves coming from the reader.Like bar codes, RFID tags identify items. However, unlike bar codes, which must be in close proximity and line of sight to the scanner for reading, RFID tags do not require line of sight and can be embedded within packages. Depending on the type of tag and application, they can be read at a varying range of distances.) Read more

Bring Your Own Device (BYOD) to Work

Surveys indicate that at least 90% of U.S. employees use their personal smartphones for work related tasks. While less than 50% of employees believe that their employers are prepared for security issues that could arise from bring your own device (BYOD) to work.

Almost 40% of employee’s portable electronic devices (PED) are not password-protected. Today, 1 in 10 employees access their own smartphone for work every week. Over 50% of employees access unsecured WiFi networks with their devices which is a known vulnerability.

BYOD Security Risks

It has been reported that some plug-ins and apps are allowing hackers to exploit devices that were connected to unsecured WiFi networks. Large numbers of phones with Bluetooth discoverable modes may still be on and most smartphone users have not disabled this feature on their devices. Hackers now can gain access to all information that has been stored or viewed on your device.

More and more people are using their personal PEDs in their workplace which can open up security breach issues for their employers. An RF shielded device can block incoming and outgoing signals, ensuring that your company’s information is not at risk.