A Mobile botnet is described as a type of botnet that targets mobile devices, attempting to gain complete control of the device and its contents as well as providing control to the botnet originator. Based on research done by several top computer software security companies, mobile phone botnets are on the rise.
RFID-What does that mean to you?
(Definition: (Radio Frequency IDentification) A data collection technology that uses electronic tags for storing data. The tag, also known as an “electronic label,” “transponder” or “code plate,” is made up of an RFID chip attached to an antenna. Transmitting in the kilohertz, megahertz and gigahertz ranges, tags may be battery-powered or derive their power from the RF waves coming from the reader.Like bar codes, RFID tags identify items. However, unlike bar codes, which must be in close proximity and line of sight to the scanner for reading, RFID tags do not require line of sight and can be embedded within packages. Depending on the type of tag and application, they can be read at a varying range of distances.)
Security issues on the rise with the BYOD trend
Bring Your Own Device (BYOD) to Work Surveys indicate that at least 90% of U.S. employees use their personal smartphones for work related tasks. While less than 50% of employees believe that their employers are prepared for security issues that could arise from bring your own device (BYOD) to work. Almost 40% of employee’s portable […]
New NIST Guidelines for Securing Mobile Devices
According to the National Institute of Standards and Technology, mobile devices must support multiple security objectives, including availability, integrity and confidentiality. This means they must be secured against different threats, which is why NIST recently published draft guidelines outlining baseline security technologies that the mobile devices must include to remain safe.
Businesses and governments are increasingly relying on different mobile devices, including smart phones and tablets. The devices become more popular with their increasing capabilities, making it even more important for them to remain cyber-secure.
RF Shielding Strategies for Improving Wireless Security
Wireless LANs transmit RF signals beyond the walls that surround them and are vulnerable to signals from outside. These issues can potentially present security risks and efficiency problems. To protect the system and improve operations, RF shielding methods should be considered.
Fundamentals of Shielding
RF shielding inhibit the passage of RF signals through a building’s walls and windows. Wireless LAN product manufacturers have been creating specialized rooms with Faraday cages for years for testing purposes. While these designs do an excellent job at blocking signals, their walls have to be built from the ground up. As result, this solution isn’t practical for use outside of product testing.
When RF shielding is necessary at a facility, RF window films and shielding paint are often used. A wide selection of both products offers varying levels of protection between 40 and 80dB, the frequencies used by wireless LANs. After application of paint to walls and film to windows, a building has a good level of protection for security and performance purposes.
Cell Phone Hacker Know Where You Are
With limited inexpensive gear hackers could readily find where you as well as your mobile phone are without you having any notion. At least this is the decision of a recent study out of the University of Minnesota.
It all rests on the basic fact that the mobile phone network has to monitor your mobile in just a certain broad range so resources can be prioritized by it to supply the greatest service possible. (Most people are aware of the fact that providers must give up such location information when subpoenaed by law enforcement agencies.)
Then when a call is available in to you, the broadcasting tower will send a signal to your phone and waits for you personally to respond. A hacker has the capacity to intercept that sign before you even hear it to be answered by the call.