-
2
-
-
79951987516
-
Hacking wifi the easy way
-
doi: 10.1016/s1353-4858(11)70014-9
-
Bradbury, D. (2011) Hacking wifi the easy way, Network Security, 2, 9-12, doi: 10.1016/s1353-4858(11)70014-9.
-
(2011)
Network Security
, vol.2
, pp. 9-12
-
-
Bradbury, D.1
-
4
-
-
84893290887
-
-
Coninsync, Retrieved 02/17/2013, from
-
Coninsync. (2013) Why You Should Avoid Saving Passwords on Your Smartphone? Retrieved 02/17/2013, from http://coninsync.com/why-you-should-avoid-saving-passwords-on-your-smartphone/.
-
(2013)
Why You Should Avoid Saving Passwords On Your Smartphone?
-
-
-
5
-
-
84893243799
-
-
CSI, 2010/2011Computer Crime and Security Survey. Retrieved 11-3-2012, from
-
CSI. (2011) 2010/2011Computer Crime and Security Survey. Retrieved 11-3-2012, from https://cours.etsmtl.ca/log619/documents/divers/CSIsurvey2010.pdf.
-
(2011)
-
-
-
6
-
-
84893306634
-
-
ESET, Retrieved 03/07/2013, from
-
ESET. (2013) Trends for 2013. Retrieved 03/07/2013, from http://go.eset.com/us/resources/whitepapers/Trends_for_2013_preview.pdf.
-
(2013)
Trends For 2013
-
-
-
8
-
-
81755177550
-
Cracking wireless networks
-
doi: 10.1016/s1353-4858(11)70120-9
-
Gold, S. (2011) Cracking wireless networks, Network Security, 11, 14-18, doi: 10.1016/s1353-4858(11)70120-9.
-
(2011)
Network Security
, vol.11
, pp. 14-18
-
-
Gold, S.1
-
9
-
-
84893242303
-
-
Forbes, February 2, 2012. Retrieved 02/11/13, from
-
Greenberg, A. (2012) Google gets serious about android ssecurity, Now auto-scans app market for malware, Forbes, February 2, 2012. Retrieved 02/11/13, from http://www.forbes.com/sites/andygreenberg/2012/02/02/google-gets-serious-about-android-security-nowauto-scans-app-market-for-malware/.
-
(2012)
Google Gets Serious About Android Ssecurity, Now Auto-scans App Market For Malware
-
-
Greenberg, A.1
-
11
-
-
84893316822
-
-
Homeland-Security, Retrieved 05/02/2013, from
-
Homeland-Security. (2013) Cybersecurity Tips. Retrieved 05/02/2013, from http://www.dhs.gov/cybersecurity-tips.
-
(2013)
Cybersecurity Tips
-
-
-
12
-
-
84893271673
-
-
InfoSec, Retrieved 02/17/2013, from
-
InfoSec. (2013) Protecting Mobile Devices. Retrieved 02/17/2013, from http://www.infosec.gov.hk/textonly/english/yourself/handheld.html.
-
(2013)
Protecting Mobile Devices
-
-
-
13
-
-
84893271001
-
-
Kaspersky, Retrieved 02/11/13, from
-
Kaspersky. (2013) Find and Call: Leak and Spam. Retrieved 02/11/13, from http://www.securelist.com/en/blog/208193641/Find_and_Call_Leak_and_Spam.
-
(2013)
Find and Call: Leak and Spam
-
-
-
14
-
-
0034316957
-
Health care management and information systems security: Awareness, training or education?
-
Katsikas, S. K. (2000) Health care management and information systems security: awareness, training or education? International Journal of Medical Informatics, 60, 129-135.
-
(2000)
International Journal of Medical Informatics
, vol.60
, pp. 129-135
-
-
Katsikas, S.K.1
-
15
-
-
84893289485
-
Should I jailbreak my iPhone?
-
Forbes, May 28, 2012. Retrieved 02/17/2013, from
-
Kingsley-Hughes, A. (2012) 'Should I jailbreak my iPhone?' And other jailbreaking questions answered, Forbes, May 28, 2012. Retrieved 02/17/2013, from http://www.forbes.com/sites/adriankingsleyhughes/2012/05/28/should-i-jailbreak-my-iphone-and-otherjailbreaking-questions-answered/.
-
(2012)
And Other Jailbreaking Questions Answered
-
-
Kingsley-Hughes, A.1
-
16
-
-
84893290096
-
-
Lookout, Retrieved 11-3-2012, from
-
Lookout. (2011) Lookout MobileThreatReport 2011. Retrieved 11-3-2012, from https://www.lookout.com/resources/reports/mobile-threat-report.
-
(2011)
Lookout MobileThreatReport 2011
-
-
-
17
-
-
84875849683
-
-
Lookout, Retrieved 01/13/2013, from
-
Lookout. (2012) State of Mobile Security 2012. Retrieved 01/13/2013, from https://www.lookout.com/resources/reports/state-of-mobile-security-2012.
-
(2012)
State of Mobile Security 2012
-
-
-
18
-
-
84893273928
-
-
Lookout, 2013 Mobile Threat Predictions. Retrieved 02/11/13, from
-
Lookout. (2013). 2013 Mobile Threat Predictions. Retrieved 02/11/13, from https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/.
-
(2013)
-
-
-
19
-
-
84868140773
-
Android architecture: Attacking the weak points
-
doi: http://dx.doi.org/10.1016/S1353-4858(12)70092-2
-
Mansfield-Devine, S. (2012a) Android architecture: attacking the weak points, Network Security, 10, 5-12, doi: http://dx.doi.org/10.1016/S1353-4858(12)70092-2.
-
(2012)
Network Security
, vol.10
, pp. 5-12
-
-
Mansfield-Devine, S.1
-
20
-
-
84866649310
-
Paranoid Android: Just how insecure is the most popular mobile platform?
-
doi: http://dx.doi.org/10.1016/S1353-4858(12)70081-8
-
Mansfield-Devine, S. (2012b) Paranoid Android: just how insecure is the most popular mobile platform? Network Security, 9, 5-10, doi: http://dx.doi.org/10.1016/S1353-4858(12)70081-8.
-
(2012)
Network Security
, vol.9
, pp. 5-10
-
-
Mansfield-Devine, S.1
-
21
-
-
84872789642
-
Security review: The past year
-
doi: http://dx.doi.org/10.1016/S1361-3723(13)70006-X
-
Mansfield-Devine, S. (2013) Security review: the past year, Computer Fraud & Security, 1, 5-11, doi: http://dx.doi.org/10.1016/S1361-3723(13)70006-X.
-
(2013)
Computer Fraud & Security
, vol.1
, pp. 5-11
-
-
Mansfield-Devine, S.1
-
22
-
-
84891843335
-
Delegate the smartphone user? Security awareness in smartphone platforms
-
doi: http://dx.doi.org/10.1016/j.cose.2012.11.004
-
Mylonas, A., Kastania, A., and Gritzalis, D. (2012) Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, 0, doi: http://dx.doi.org/10.1016/j.cose.2012.11.004.
-
(2012)
Computers & Security
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
24
-
-
84880906554
-
-
Platform-Versions, Retrieved 02/05/2013, from
-
Platform-Versions. (2013) Platform Versions. Retrieved 02/05/2013, from http://developer.android.com/about/dashboards/index.html.
-
(2013)
Platform Versions
-
-
-
25
-
-
84888985340
-
-
SANS, Retrieved 02/11/2013, from
-
SANS. (2012). Mobility/BYOD Security Survey. Retrieved 02/11/2013, from https://www.sans.org/reading_room/analysts_program/mobility-sec-survey.pdf.
-
(2012)
Mobility/BYOD Security Survey
-
-
-
26
-
-
84893254482
-
-
Statcounter, Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013, StatCounter Global Stats. Retrieved 02/12/13, from
-
Statcounter. (2013) Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013, StatCounter Global Stats. Retrieved 02/12/13, from http://gs.statcounter.com/#mobile_os-US-monthly-201201-201301.
-
(2013)
-
-
-
27
-
-
84893260240
-
-
PCWorld, August 31, 2011. Retrieved 02/11/13, from
-
Strohmeyer, R. (2011) Why I get apps from amazon, not google, PCWorld, August 31, 2011. Retrieved 02/11/13, from http://www.pcworld.com/article/239270/why_i_get_apps_from_amazon_not_google.html.
-
(2011)
Why I Get Apps From Amazon, Not Google
-
-
Strohmeyer, R.1
-
29
-
-
84857696369
-
BYOD: Enabling the chaos
-
doi: 10.1016/s1353-4858(12)70013-2
-
Thomson, G. (2012) BYOD: enabling the chaos, Network Security, 2, 5-8, doi: 10.1016/s1353-4858(12)70013-2.
-
(2012)
Network Security
, vol.2
, pp. 5-8
-
-
Thomson, G.1
-
30
-
-
84893284118
-
-
Trend-Micro, Retrieved from
-
Trend-Micro. (2012) Repeating History. Retrieved from http://www.trendmicro.com/cloudcontent/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdf.
-
(2012)
Repeating History
-
-
-
31
-
-
84885759934
-
-
US-CERT, Retrieved 5/2/2013, from
-
US-CERT. (2011a) Cyber Threats to Mobile Phones. Retrieved 5/2/2013, from http://www.uscert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf.
-
(2011)
Cyber Threats to Mobile Phones
-
-
-
32
-
-
84893311516
-
-
US-CERT, Retrieved 5/2/2013, from
-
US-CERT. (2011b) Protecting Portable Devices: Physical Security. Retrieved 5/2/2013, from http://www.us-cert.gov/ncas/tips/ST04-017.
-
(2011)
Protecting Portable Devices: Physical Security
-
-
-
33
-
-
84893310120
-
-
ZDNet, Retrieved 02/12/13, from
-
ZDNet. (2013) DJailbreaking or Rooting Devices and BYOD Mix? Retrieved 02/12/13, from http://www.zdnet.com/does-jailbreaking-or-rooting-devices-and-byod-mix-7000011069/.
-
(2013)
Does Jailbreaking Or Rooting Devices and BYOD Mix?
-
-
|