Posts Tagged ‘mobile applications’

h1

Cyber experts show vulnerability of GSM networks

February 21, 2012

A group of cyber experts stunned a conference here when they showed the vulnerability of GSM mobile networks which can be easily exploited by hackers enabling them to impersonate a user’s identity and make calls from his account without a clue to the consumer.

The ethical group — matrix shell — gave a demonstration of the hacker’s technique on a live network of a leading mobile service provider in which they managed to make a call using the number of a audience member without actually using his phone or SIM.

Advertisements
h1

Enterprise Application Storefront

February 18, 2012

Enterprise mobile devices and applications must be secured and managed.  A secure enterprise application storefront is the key.

1. Decide on mobile applications and update as needed

2. Secure all devices

3. Block the users from downloading applications if not secure or approved.  

IT needs to be able to authenticate the device and the user. IT must also know the state of the device’s security. Is it running a recent OS or an older one. Does it have encryption? Has it been compromised?

Any mobile application that is not tied to mobile device management and enterprise security is insecure.