Text Size:   A+ A- A   •   Text Only
Find     
Site Image
Mobile Computing Security
Introduction
 
Information kept within the confines of an office or your home is much easier to secure than information that leaves on mobile devices such as:
  • Laptop computers and tablet PCs
  • E-mail devices such as Blackberries
  • Personal digital assistants (PDAs) such as PalmPilots
  • Mobile phones
  • Audio and video recording devices (digital and analog) such as digital cameras or voice recorders
  • USB devices such as keyfobs or pen flash drives
  • iPods
  • MP3 devices

Featured Links
 
The links in this section will give you some ideas about how you can reduce the risk associated with mobile devices.
 
 
  • Laptop Privacy Filters
    If you do a lot of work on your laptop in public places such as coffee shops or airports, you should consider using a "privacy filter" to reduce the chance of someone reading your screen over your sholder. Here's a review of one such filter.
 
 
 
  • Social Engineering, the USB Way
    In 2006, a consulting company scattered 20 USB flash drives in the parking lot of a credit union. After 3 days, 15 of the USB drives had been picked up and plugged into credit union computers. What the employee's didn't know what that the USB drives had been infected with a Trojan horse that logged passwords and login information, and e-mailed it back to the consultants. Read more about the experiment in this article.
 
  • Cell Phone Security
    Cell phones are more vulnerable than regular phones due to two dangers: eavesdroppers can listen in on your calls, and thieves can bill their own calls to your account.
 
 
  • Mission: Laptop Security (game)
    You've already lost one laptop, Agent Smith. Your job's on the line if it happens again. Make wise choices this time, and it's mission accomplished. Test your luck with this game from OnGuard Online.