Tuesday, June 26, 2007

Can cell phones be hacked? Yes, but it's not easy

Network World

Daily News: AM




Network World Daily News: AM, 06/26/07

Can cell phones be hacked?
A Tacoma, Wash., family is claiming the cell phones it uses have been taken over by hackers, who are turning them on at will, capturing conversations and manipulating the cell phone camera. The story of the Kuykendall family, as reported in the Tacoma News Tribune last week, seems an unlikely one, with tales of how they believe their cell phones, as well as those owned by other families, have been taken over and cell-phone cameras mysteriously turned on and off. While the mystery of the Kuykendall family’s cell-phone experience isn’t fully explained, people are wondering whether such events are even possible. Security experts say yes - but still in the realm of the unlikely.

WAN optimization to the max
WAN optimization appliances take on client-side acceleration, network security, troubleshooting and more as specialty vendors stave off competition from network-based alternatives.

Summer gadget guide
Cool Tools to entertain or keep you connected. Plus: slideshow

Compare Products with Network World's VoIP and Convergence Buyer's Guide

From deployable IP-PBX systems to unified messaging, Network World has detailed information on hundreds of products. Side-by-side comparisons along with objective test and review results make it quick and easy to find the solutions that are right for your enterprise.

Click here to find out more.

Sophos upgrades endpoint security suite
Sophos upgrades its endpoint antivirus software with intrusion prevention features, control over unauthorized applications, and new management features.

Catbird brings security to VMware customers
Catbird unveils V-Agent virtualization security product for VMware.

Rivermine brings in $8.7 million in third round
Rivermine announced Monday that it closed its third round of financing bringing in $8.7 million.

R U there? Feds want presence systems, survey says
Federal network managers are hot on presence applications that enable real-time notification and identification systems, according to a Cisco survey.

ICANN to tackle transparency, top-level domains, in meeting
The Internet Corporation for Assigned Names and Numbers opened a week-long meeting on Monday where it will address critical issues like new generic top-level domains, internationalized domain names and the organization's efforts to become more ...

Funding, security top issues for gov't telecom managers
U.S. government agencies are interested in unified communications systems that integrate voice, video and data over Internet Protocol, but they have concerns about funding and security, according to a survey released Monday.

Video

Optimizing WAN performance
How did GHAFARI Companies use application acceleration technology to move large files between offices and give LAN-like performance to remote outposts? Robert Bell, director of IT, explains on this edition of Voices from IT Roadmap.

Blogs

Buzzblog: Early iPhone lines and long-ago tales
They're lining up... already? Nutty, sure, but who hasn't done this sort of thing? I've done it twice. Please share your stories with us online.

Today on Layer 8, where we have to say if we spent all that time and money inventing something you can bet we'd name it ourselves:
Researchers a the University of Maryland have come up with a desktop parallel computing system they say is 100 times faster than current PCs - and the kicker is, they want you to name it.

TODAY'S MOST-READ STORIES:

1. How MySpace is hurting your network
2. Lawyers show how to side-step immigration law
3. Gartner to IT: Avoid Apple's iPhone
4. Cisco moves reputation services into network devices
5. 10 automation companies to watch
6. NY college plans 11n WLAN rollout this summer
7. Pentagon shuts down systems after cyberattack
8. Microsoft, IBM feel heat from Google Apps
9. Why time stands still on the iPhone
10. The case of the 500-mile e-mail

MOST E-MAILED STORY:
Gartner to IT: Avoid Apple's iPhone


Contact the author:

Questions? Feedback? Contact NetworkWorld.com Site Editor Jeff Caruso.



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: security.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment