Protect your mobile device from hackers and malicious users from intruding on your personal information. Brought to you by the Army Media Center.
DMA is designed to modernize and streamline media operations by consolidating military service and DoD media components into a single, joint, integrated multimedia communications organization. DMA was established in October 2008 as a result of the Defense Base Realignment and Closure Act.
What kind of data is your cell phone company collecting? Malte Spitz wasn’t too worried when he asked his operator in Germany to share information stored about him. Multiple unanswered requests and a lawsuit later, Spitz received 35,830 lines of code -- a detailed, nearly minute-by-minute account of half a year of his life.
Malte Spitz asked his cell phone carrier what it knew about him--and mapped what he found out.
Search engine giant Google is using its size and breadth to help stop the spread of a click-jacking malware infection. DNSChanger is a Trojan-style piece of malware that makes unauthorized changes to domain name system (DNS) settings on infected computers.
Infected computers then redirect users to fake, infected websites that appear valid, but which are instead hacker-developed creations. The number of currently infected computers is estimated at 500,000, down from more than 4 million at the height of the outbreak.
A group of cyber experts stunned a conference here when they showed the vulnerability of GSM mobile networks which can be easily exploited by hackers enabling them to impersonate a user's identity and make calls from his account without a clue to the consumer.
The ethical group -- matrix shell -- gave a demonstration of the hacker's technique on a live network of a leading mobile service provider in which they managed to make a call using the number of a audience member without actually using his phone or SIM.
To help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates.
Even with the best of intentions, and the most technically enforced policy, a ban for putting sensitive information on mobile devices is probably not going to be 100 percent effective,
That's because all mobile devices enable users to enter data and to receive e-mails that may, in some cases, contain sensitive information.