DATA STEALING FROM E-MAIL
HOW TO STEAL DATA FROM AN E-MAIL? Social Engineering. Exploiting the Vulnerabilities in security. Keyloggers and browser monitoring. SOCIAL ENGINEERING-
Read moreHOW TO STEAL DATA FROM AN E-MAIL? Social Engineering. Exploiting the Vulnerabilities in security. Keyloggers and browser monitoring. SOCIAL ENGINEERING-
Read moreThere are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also
Read moreENCRYPTION The Bluetooth specification does not describe encryption, some manufacturers produce devices without encryption or the encryption mode is deactivated
Read moreBLUETOOTH ATTACKS ON MOBILE PHONES BLUESNARF: SNIFFING Bluesnarfing is the unauthorized access of information from a wireless device through a
Read more“WHY IS MOBILE SECURITY IMPORTANT?” Mobile devices are the fastest growing consumer technology, with worldwide unit sales expected to increase
Read moreThe Main Protocols used by Mobile Phones: SMS EMS MMS WAP. INTRODUCTION TO SMS MESSAGING- SMS stands for Short Message
Read moreADVANCED MOBILE PHONE SYSTEM (AMPS) Advanced Mobile Phone System (AMPS) was an analogmobile phone system standard developed by Bell Labs,
Read moreIn 1895 a few years after invention of telephone, Marconi demonstrated the first radio based wireless transmission. The first radio
Read more