Thursday, October 06, 2005

Wireless Strategies: Researchers: SMS attacks could cripple cell phones


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 October 7, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: More than just a cell phone

›› In the news:
- Nokia puts Symantec on its mobile phones
- Researchers: SMS attacks could cripple cell phones


›› Webcasts and white papers:
- Adoption of Mobile Technologies
- Selective access in wireless network security


›› Go figure: Google Wi-Fi will grab a broadband slice - but not the whole pie

›› ITwhirled: Booths silence cell-phone boors

›› From the network:
- Webcast Addresses Key Business Intelligence Technologies

›› FEATURE

More than just a cell phone
I have a cell phone -- it's an old-fashioned model, a single, rigid piece that doesn't flip open like the ones on "Star Trek." It doesn't connect to the Internet, and it doesn't have a camera. The only extra frill it has is the address book, which is all I need. But as usual, I'm behind the times, a day late and a dollar short, and according to my friends with camera phones, living in the dark ages.


›› IN THE NEWS

Nokia puts Symantec on its mobile phones
Researchers: SMS attacks could cripple cell phones
Motorola confirms layoff of 1,900 employees
Maspro pushes Wi-Fi five kilometers
WLAN quality-of-service specification approved
EarthLink selected for Philadelphia Wi-Fi
Motorola, Microsoft to partner on products for first responders
Verizon Wireless to offer TV on mobile phones?
Windows Treo threatens RIM middleware

Get the latest news here...


›› GO FIGURE

20 percent
Portion of the broadband market a service like Google Wi-Fi could capture.
Source: IDG News Service


›› WEBCASTS AND WHITE PAPERS

Adoption of Mobile Technologies - New Webcast
Mobile and wireless technologies must be considered an extension of an enterprise's IT infrastructure. To learn more about the latest mobile and wireless technology offerings, watch this Webcast now.

Selective access in wireless network security
Complexity is a major enemy of security. Learn about highly integrated products from leading manufacturers that include all of the elements of security in one place. Watch this new Webcast now.

View more webcasts...      Read additional white papers...

Advertisement



›› ITWHIRLED

Booths silence cell-phone boors
Here's an idea... The next time you are out and about and have the urge to, say, make a phone call to your doctor about some sensitive personal issue, rather than blurt it out for all to hear, step into one of these specially designed privacy boxes. Nothing short of revolutionary.

More offbeat news, reviews and other stuff...


FROM THE NETWORK:

How to Choose the Right Search Engine for Your Business
If you're serious about implementing effective site and intranet search, you need to read Verity's new white paper and learn what pitfalls to avoid that plague even the most seasoned technology buyers.

Enterprise Communications: Dawn of a New Era
Second generation communication technology is now being developed to include VoIP telephony, unified messaging, unified communications and speech recognition based technologies. Learn more in this new webcast now.

Webcast Addresses Key Business Intelligence Technologies
Join leading industry analyst, Peter Burris, as he takes you through the circumstances faced by many businesses as they utilize business intelligence to take better business actions in today?s competitive arena. Go now.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

Stay Out of the Headlines!
Lost or stolen laptops, desktops - even USB devices - may expose your business to significant regulatory compliance issues and brand damage. CREDANT's revolutionary intelligence-based encryption secures your data no matter where it is stored.
Protect Yourself at WiFi Hotspots with PublicVPN
PublicVPN.com protects your WiFi connection from snoops by scrambling all the data you send and receive at your WiFi hotspot. Shield your online activity from prying eyes when you're out of the office with our easy, secure, and affordable service.
Remote Access - Remote PC
RemotePC provides secure remote access for mobile and call center professionals for remote support via Internet.
Notebook PC Sys Admin
Support notebook PCs on the move. Instantly gain access to your mobile PCs as soon as they connect to the Internet. Complement or replace existing VPN solution. Rapid problem resolution thru integrated diagnostic toolset.
Wireless - PDA & Cell Phone Batteries - AtBatt.com
Tired of low battery reading? AtBatt.com can provide fresh power to your wireless devices. Simply choose your Brand and Model from our database to find your correct battery. Black Berry, Dell, HP, Toshiba, Nokia, Motorola and more.
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.



No comments:

Post a Comment