A Mobile botnet is described as a type of botnet that targets mobile devices, attempting to gain complete control of the device and its contents as well as providing control to the botnet originator. Based on research done by several top computer software security companies, mobile phone botnets are on the rise.
How Vulnerable Are PED’s (portable electronic devices) Against a Hacker?
Most people are unaware of how easily someone can hack into their cell phone. There are devices that allow someone (hacker) to hack into your cell phone by just dialing the number. With this technology, they can also listen to your calls, read your emails and texts, listen to the phone’s surroundings such as conversations going on in the room, gain access to your photos and your social media information or any other information stored on your phone. They can even retrieve your password to your online bank account.
RFID-What does that mean to you?
(Definition: (Radio Frequency IDentification) A data collection technology that uses electronic tags for storing data. The tag, also known as an “electronic label,” “transponder” or “code plate,” is made up of an RFID chip attached to an antenna. Transmitting in the kilohertz, megahertz and gigahertz ranges, tags may be battery-powered or derive their power from the RF waves coming from the reader.Like bar codes, RFID tags identify items. However, unlike bar codes, which must be in close proximity and line of sight to the scanner for reading, RFID tags do not require line of sight and can be embedded within packages. Depending on the type of tag and application, they can be read at a varying range of distances.)
Security issues on the rise with the BYOD trend
Bring Your Own Device (BYOD) to Work Surveys indicate that at least 90% of U.S. employees use their personal smartphones for work related tasks. While less than 50% of employees believe that their employers are prepared for security issues that could arise from bring your own device (BYOD) to work. Almost 40% of employee’s portable […]