Access your Pro+ Content below.
Gary McGraw on mobile security: It’s all about mobile software security
This article is part of the July/August 2012 issue of Information Security magazine
You're a geek (well, you are reading this!), so you probably have a smartphone, maybe something cool like a Galaxy Nexus running Android or an iPhone4S. You’re bumming if you still have a rusty old RIM Blackberry, but likely are due for an upgrade any day now,as soon as the lagging corporate policy allows you to switch. You also have a security disaster in your pocket just waiting to happen. Don’t feel bad, we all do. So what is a geek to do about mobile security? I wrote my first article on mobile device security way back in June 2005. In it, I pondered whether cell phones were going to be the next big security target. This was before the massive convergence of computers and phones. Even back then, we saw the storm brewing. In fact, the first real cell phone worm, Cabir, was released in 2004. SMS (or texting as the kids call it) seemed like an even more obvious vector than Bluetooth and, sure enough, there are plenty of SMS-based attacks to be seen. Convergence is all done now, and phones, computers, laptops, and iPads are ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Learn pen testing best practices and how to build an internal pen testing team.
New techniques are emerging to help organizations analyze security data and improve security defenses.
SharePoint has become ubiquitous in the enterprise, but organizations can overlook security. Learn SharePoint security best practices in this article.
Restricting user permissions, server hardening and dedicated service accounts are critical.
Experts say malware toolkit isn’t unique, but warn of cyberweapons falling into the wrong hands.
Columns in this issue
Mobile systems have a lot of moving parts, but securing them is as simple as practicing software security.
Government and private sector collaboration is critical to surviving in cybespace.
Breach at the professional networking site highlights password practices, storage procedures.