Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Book Image

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Overview of this book

The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don't manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security is growing on a daily basis and this guide may just be the help you need. Mobile Security: How to Secure, Privatize, and Recover Your Devices will teach you how to recognize, protect against, and recover from hacking attempts and outline the clear and present threats to your online identity posed by the use of a mobile device. In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data's security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.
Table of Contents (21 chapters)
Mobile Security: How to Secure, Privatize, and Recover Your Devices
Credits
Foreword
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Tips to Help You Protect Your Mobile Device
The History of Social Networking, the Internet, and Smartphones
Index

Index

A

  • access control
    • about / Access control
  • ACLU
    • about / Who has your data? Round 2…
  • ACME Anvil Corporation / Buying your device
  • AIM (Aol Instant Messenger)
    • about / Text messaging, chatting, and video chatting
  • Airwatch
    • URL / MDM solutions and products
  • Altavista
    • about / The Internet
  • Amazon.com / 2012 is the new 1984 – how companies track us
  • Amazon Web Service / The cloud
  • Android
    • about / The difference between Android and iOS, Jailbreak and rooting, The difference between Android and iOS
    • differentiating, with iOS / The difference between Android and iOS, The difference between Android and iOS
    • mobile security features / The mobile user's security
    • data encryption / Encryption on Android
  • Android@Home technology / The difference between Android and iOS
  • Android configuration tools
    • about / Android configuration tools
    • configuration tool / Configuration
    • simple tether configuration tool / Simple tether configuration tool
    • simple router configuration tool / Simple router configuration
    • Lookout / Lookout
    • quick settings / Quick settings
  • Android device
    • preventative measures, for hacking / Android
    • wiping / Wiping an Android device
    • backup / Android backup
  • Android devices
    • apps, downloading to / Touch, but don't break
    • list / Let's not forget Windows
  • Android Lost app / Wiping an Android device
  • Android operating system
    • differentiating, with iOS / The difference between Android and iOS
  • Android profile
    • about / The Android profile
  • Android spartphones
    • about / Reach out and touch
  • antivirus software
    • installing, on smartphones / Antivirus software on smartphones
  • AOL
    • about / The Internet
  • Apple / The iPhone – why every phone secretly wants to be a smartphone, The Apple profile, BYOD
    • future plans / And now the rest of the story
    • URL, for online assistant / The device type (BYOD or the corporate device)
  • Apple App store / Toll fraud
  • Apple App Store
    • about / Downloaded applications
  • Apple device
    • backup / Apple backup
    • restore / Apple backup
  • Apple devices
    • apps, downloading to / Touch, but don't break
  • Apple iCloud / Cloud computing security
  • Apple iPhone
    • about / Reach out and touch
    / Mobiles
  • Apple iTunes application / Android backup
  • Apple profile
    • about / The Apple profile
  • applicability, Mobile Acceptable Use Policy (MAUP)
    • rules / Rules
  • application
    • authenticity, verifying / Verifying that an application is legitimate
  • application developer
    • contacting, for application issues / Application issues
  • application downloads
    • device, accessing through / Attacks through attachment and application downloads
  • application issues
    • application developer, contacting for / Application issues
  • application malfunction
    • about / Application issues
    • verifying / Application issues
  • application management
    • MDM, leveraging for / Leveraging MDM for application management
  • application servers
    • about / The hidden world (some advanced information)
  • apps
    • downloading, to Android devices / Touch, but don't break
    • downloading, to Apple devices / Touch, but don't break
    • hidden features / Hidden "features"
    • scanning, Bouncer used / And now the rest of the story
  • App Store
    • about / Touch, but don't break, Mobiles
  • Archie
    • about / The Internet
  • As-is considerations
    • about / Extended warranty considerations
  • As is warranty
    • about / Basic terms
  • AT&T / Hidden "features"
  • attachment
    • device, accessing through / Attacks through attachment and application downloads
  • AUP
    • about / Acceptable use policy (AUP)
    • basic format / Acceptable use policy (AUP)
  • automated customer support system
    • about / Customer support by phone

B

  • backup, Android device
    • about / Android backup
  • backup, Apple device
    • about / Apple backup
  • backup, mobile device
    • about / The Apple profile
  • backup tools, Android
    • Mobile Backup II / Android backup
    / Android backup
  • barcode
    • about / CueCats and QR codes
  • Bell System telephone
    • about / Reach out and touch
  • BlackBerry / Mobile and business
  • Blackberry / Mobiles
  • Blackberry Enterprise Server
    • about / Establishing appropriate security settings
    / Messaging, calendar, and personal information management, Elements of device management
  • Blackberry Enterprise Server (BES) 10 / Licensing information for IBM Notes Traveler
  • Bouncer
    • about / And now the rest of the story
    • used, for scanning apps / And now the rest of the story
  • bouncer
    • about / The difference between Android and iOS
  • BREW
    • about / Making a smartphone smart
  • BYOD
    • used, for connecting to corporate network / Mobile Device Management
    • about / Toby's story, Definitions, The device type (BYOD or the corporate device), BYOD, Consumer-focused devices, Glossary
    • maintenance / The smartphone – a personal device, a company device, or both?
    • malfunction, determining / BYOD

C

  • car-phone
    • about / Mobiles
  • Carbonite / Cloud computing security
  • Carrier IQ
    • about / Hidden "features"
  • Carrier IQ app
    • personal information, collecting by / The fallout, The truth is out there
  • Cellcrypt
    • about / Encryption on iOS
  • cell phone
    • tracking / Who has your data? Round 2…
  • cell phone insurance
    • about / Basic terms
  • cell phone ownership
    • about / Speaking of the younger generation…
  • cell phones
    • about / Mobiles
  • cellular
    • using / Specific management of the device
  • certificate management
    • about / Access control
  • Chase
    • about / Mobile finance – buying and selling in the mobile marketplace
  • chatting
    • about / Text messaging, chatting, and video chatting
  • check-in services
    • about / Who has your data? Round 3…
  • children, chatting
    • risks / Strangers and dangers
  • Classmates.com / Social networking
  • closed systems
    • about / Jailbreak and rooting
  • cloud computing
    • about / The cloud, Cloud computing security
    • designing, for data retrieval / The cloud
    • risks / The risks of cloud computing
    • architecture / How it works
    • working / How it works
  • cloud computing, architecture
    • frontend / How it works
    • network layer / How it works
    • backend / How it works
  • cloud security
    • about / How it works, Cloud security
    • data location / Cloud security
    • data segregation / Cloud security
    • privileged user access / Cloud security
    • security compliance / Cloud security
    • disaster recovery (DR) / Cloud security
  • CommWarrior
    • about / Virus/worms/others
  • companies
    • demographic information, collecting / 2012 is the new 1984 – how companies track us
    • smartphone activities, tracking / 2012 is the new 1984 – how companies track us
    • computer activities, tracking / 2012 is the new 1984 – how companies track us
  • company business
    • conducting, smartphones used for / The smartphone – a personal device, a company device, or both?
  • complete wipe
    • about / Management of data on the device
  • component
    • installing, to protect end users / The hidden world (some advanced information)
    • installing, to protect corporate network / The hidden world (some advanced information)
    • installing, to protect corporate data / The hidden world (some advanced information)
  • compromised login information
    • protecting / Compromised accounts
  • CompuServe
    • about / The Internet
  • computer activities
    • tracking / 2012 is the new 1984 – how companies track us
  • concerns, mobile device
    • security / The mobile user's security
    • privacy / The mobile user's security
  • configuration, IBM Notes Traveler
    • about / Overview of different clients
  • configuration profile
    • about / iPhone configuration tools
  • consumer-based applications
    • about / Generally available applications
  • consumer-focused devices
    • about / Consumer-focused devices
  • Content Injection phishing / Types of phishing
  • cookies
    • about / Cookies, cookies everywhere
    • session cookie / Cookies, cookies everywhere
    • persistent cookies / Cookies, cookies everywhere
  • corporate access
    • device, enabling for / Procedure to enable a device for corporate access
  • corporate applications
    • used, for communicating among mobile users / Collaboration and corporate applications
    • managing / Leveraging MDM for application management
    • distributing / Leveraging MDM for application management
  • corporate collaborative environment
    • about / Collaboration and corporate applications
  • corporate communication
    • devices, used for / Consumer-focused devices
  • corporate communication devices
    • about / Types of devices in the environment
  • corporate computing
    • about / Mobile Device Management
  • corporate computing enterprise
    • about / Details of MDM
  • corporate data
    • about / Does your company trust your device?, Corporate data and information
    • security concern / Does your company trust your device?
    • protecting, component installed / The hidden world (some advanced information)
    • securing, MDM used for / Consumer-focused devices
  • corporate device, Mobile Acceptable Use Policy
    • about / Company owned devices
    • overview / Overview
    • rules / Rules
    • disciplinary action / Disciplinary action
  • corporate help desks
    • about / Power users
  • Corporate IT Security policies / Types of devices in the environment
  • corporate network
    • connecting, BYOD used / Mobile Device Management
    • mobile device, accessing to / The hidden world (some advanced information)
    • protecting, component installed / The hidden world (some advanced information)
  • corporate owned device
    • about / Glossary
  • corporate security policy
    • about / Corporate security policies
  • corporate security procedures
    • about / Corporate security procedures
  • correct deployment approach
    • determining / Determining the correct deployment approach
  • cost based on a recurring charge, extended warranty
    • about / Types of extended warranties
  • cost considerations
    • about / Extended warranty considerations
  • CueCat
    • about / CueCats and QR codes
  • customer concerns
    • addressing / The Service Level Agreement (SLA)
  • customer issues
    • resolving, through customer support systems / The wide world of customer service and technical support
  • customer location
    • tracking / Who has your data? Round 3…
  • customer service, contacting
    • checklist / Before you make the call – information, password problems, and your malfunction
  • customer service, guidelines
    • SLA / The Service Level Agreement (SLA)
  • customer service representatives
    • malfunction, addressing to / How to make the most of your time while on the line
    • about / Answer every question
    • answering / Answer every question
    • malfunction, describing to / Do not skip steps when describing your problem
  • customer support system
    • automated operation / Customer support by phone
    • hybrid operation / Customer support by phone
    • internet chatting / Chat and texting solutions
    • SMS text messaging / SMS text
  • customer support systems
    • customer issues, resolving through / The wide world of customer service and technical support
    • about / Customer support in the mobile space – phone, chat, and text
    • personal operation / Customer support by phone
  • cyberbullying
    • about / And unlimited damage
    • signs / And unlimited damage

D

  • damage coverage
    • about / Extended warranty coverage
  • data
    • about / Data good enough to steal, Management of data on the device
    • corporate data / Management of data on the device
    • personal data / Management of data on the device
  • data-at-rest
    • about / Data encryption
  • data-in-transit
    • about / Data encryption
  • data-in-use
    • about / Data encryption
  • data encryption
    • about / Data encryption
  • data encryption, Android
    • about / Encryption on Android
    • drawbacks / Encryption on Android
  • data encryption, iOS
    • about / Encryption on iOS
  • data location
    • about / Cloud security, Management of data on the device
  • data management
    • about / Management of data on the device
  • data segregation
    • about / Cloud security
  • data theft
    • about / Your data in their hands, Types of phishing
  • data thieves
    • about / And that's only the first part…
  • deceptive phishing
    • about / Types of phishing
  • demographic information
    • collecting / 2012 is the new 1984 – how companies track us
  • Developer Distribution Agreement
    • about / Touch, but don't break
  • device
    • accessing, through application downloads / Attacks through attachment and application downloads
    • accessing, through attachment / Attacks through attachment and application downloads
    • testing / Test your device
    • wiping / To wipe or not to wipe – partial or complete
    • data / Management of data on the device
    • data management / Management of data on the device
    • access control, within corporate environment / Access control
    • enabling, for corporate access / Procedure to enable a device for corporate access
  • device, wiping
    • decision making / To wipe or not to wipe – partial or complete
    • full wipe / To wipe or not to wipe – partial or complete
    • partial wipe / To wipe or not to wipe – partial or complete
  • device hacks
    • unawareness / Have you been hacked?
    • indication / Have you been hacked?
    • about / Knowing the difference – device hacks, profile hacks, or both
    • differentiating, with profile hacks / Knowing the difference – device hacks, profile hacks, or both
    • post actions / In the event of a hack, Who to contact, Summing it up
    • addressing / BYOD
    • checklist / What to do and when to do it – a list in the event that you've been hacked
  • device profile
    • about / Device profiles
    • Apple profile / The Apple profile
    • Android profile / The Android profile
  • devices
    • types / Types of devices in the environment
    • used, for corporate communication / Consumer-focused devices
  • devices, types
    • consumer-focused devices / Consumer-focused devices
  • device type
    • determining / Determining the types of devices that will be supported
    • about / Access control
  • Digby / Who has your data? The final stretch…
  • Digital Convergence Corporation / CueCats and QR codes
  • digital identity
    • about / Troy and You
  • digital information
    • about / Troy and You
  • direct connection
    • configuring, to IBM Traveler Server / Direct connection
  • disaster recovery (DR)
    • about / Cloud security
  • disciplinary action
    • about / Disciplinary action, Disciplinary action
  • DMZ
    • about / The hidden world (some advanced information)
  • DNS-based phishing (pharming)
    • about / Types of phishing
  • Domain Name System (DNS) / Types of phishing
  • Domino Directory Assistance / Location of the IBM Notes Traveler Servers
  • Domino Servers
    • about / Connection methodologies to the Traveler servers
  • DoSomething.org / And unlimited damage
  • downloaded applications
    • about / Downloaded applications
    • antivirus software, on smartphones / Antivirus software on smartphones
  • DRM
    • about / Digital Rights Management
    • URL, for info / Digital Rights Management
  • DroidKungFu
    • about / Virus/worms/others
  • Dropbox / Cloud computing security
    • about / Generally available applications
  • DWA
    • about / IBM Mobile Connect
  • DynaTAC
    • about / Mobiles

E

  • e-mail
    • about / Text messaging, chatting, and video chatting
  • eCID
    • about / Identifying your phone – the numbers that set your device apart
  • elements, MDM
    • about / Elements of device management
  • Encrypted Backup setting
    • about / iPhone
  • encryption policies
    • about / Management of data on the device
  • end users
    • protecting, component installed / The hidden world (some advanced information)
  • Engadget
    • about / The iPhone – why every phone secretly wants to be a smartphone
  • Enterprise Database Architecture
    • about / The architectural design of the IBM Notes Traveler service
  • Erase Data function
    • about / iPhone
  • extended warranty
    • about / Basic terms, Types of extended warranties
    • considerations / Extended warranty considerations
    • purchasing / To purchase an extended warranty or not?
    • recommendations / In a nutshell
  • extended warranty, considerations
    • cost / Extended warranty considerations
    • written statement / Extended warranty considerations
    • As-is / Extended warranty considerations
    • multiyear plan / Extended warranty considerations
  • extended warranty, types
    • about / Types of extended warranties
    • verbal / Types of extended warranties
    • included / Types of extended warranties
    • cost based on a recurring charge / Types of extended warranties
    • imbedded charge / Types of extended warranties
  • extended warranty coverage
    • about / Extended warranty coverage
  • extended warranty coverage, types
    • about / Extended warranty coverage
    • product defects / Extended warranty coverage
    • damage / Extended warranty coverage
    • lost / Extended warranty coverage
    • software and application / Extended warranty coverage

F

  • Facebook
    • about / Social networking, Social networking
    / Phishing, The Internet
  • Facebook Beacon / Facebook and customer tracking
  • Facebook members
    • tracking / Facebook and customer tracking
  • FakeInst
    • about / Toll fraud
    • mobile device, infecting / Toll fraud
  • Fandango / Facebook and customer tracking
  • file repositories
    • about / Collaboration and corporate applications
  • Find my iPhone feature
    • about / iPhone, Wiping an iOS device
  • FinFisher / Malware
    • about / Malware
  • firewall
    • about / The hidden world (some advanced information)
  • Friendster
    • about / Social networking, Social networking
  • frontend network
    • protecting, MDM used / Does your company trust your device?
  • frontend network devices
    • about / Frontend network protection
  • FTC
    • about / Facebook and customer tracking
  • full wipe
    • about / To wipe or not to wipe – partial or complete
  • functions, MDM
    • about / Specific management of the device

G

  • Gartner Magic Quadrant / Potential solutions
  • Geinimi Trojan
    • about / Malware and viruses
  • Geocities / Social networking
    • about / Social networking
  • Gingerbread 2.3 / Virus/worms/others
  • Gingermaster
    • about / Virus/worms/others
  • Gizmodo
    • about / The fallout
  • global positioning system (GPS)
    • about / Bring your mobile device to work day
  • Global Positioning System (GPS)
    • about / The mobile user's security
  • Good Technology / Messaging, calendar, and personal information management
  • Google / The difference between Android and iOS, BYOD
    • future plans / And now the rest of the story
    • about / The Internet
  • Google Android Store
    • about / Downloaded applications
  • Google Docs / Cloud computing security
  • Google Play
    • about / Touch, but don't break
  • Google Play Store / The difference between Android and iOS
  • GPS (Global Positioning System)
    • about / Malware and viruses
  • Groupon application
    • about / Phishing

H

  • hacker
    • device, accessing through attachments / Attacks through attachment and application downloads
    • device, accessing through application downloads / Attacks through attachment and application downloads
  • hackers
    • smartphones, protecting from / Preventative measures – how to reduce the likelihood that your device will be hacked
  • Hackerspace / CueCats and QR codes
  • hardware malfunction
    • manufacturer, contacting for / Hardware
  • Health Insurance Portability and Accountability Act (HIPAA) / Legal requirements and government regulations
  • hidden app
    • benefits / Hidden "features"
  • hidden features, apps
    • about / Hidden "features"
  • home office
    • about / Mobile Device Management
  • HTML injection
    • about / Virus/worms/others
  • Hulu / The Internet
  • hybrid customer support system
    • about / Customer support by phone

I

  • IBM / Text messaging, chatting, and video chatting
  • IBM Domino / Messaging, calendar, and personal information management
  • IBM Domino Enterprise Server
    • about / Review of the IBM Notes Traveler Server
  • IBM Domino Server technology
    • about / Review of the IBM Notes Traveler Server
  • IBM Domino Server technology, component
    • IBM Notes Traveler / Review of the IBM Notes Traveler Server
  • IBM Endpoint Manager
    • URL / MDM solutions and products
    / Determine if a pure MDM solution is required in the environment
  • IBM iSeries / Licensing information for IBM Notes Traveler
  • IBM Lotus Mobile Connect 6.1 / Reverse proxy
  • IBM Mobile Connect (IMC)
    • about / IBM Mobile Connect
  • IBM Notes Traveler
    • architectural design / The architectural design of the IBM Notes Traveler service
    • features / The architectural design of the IBM Notes Traveler service
    • correct deployment approach, determining / Determining the correct deployment approach
    • configuration / Overview of different clients
    • clients / Overview of different clients
    • licensing information / Licensing information for IBM Notes Traveler
  • IBM Notes Traveler 9
    • about / Licensing information for IBM Notes Traveler
  • IBM Notes Traveler Server
    • about / Access to the IBM Notes Traveler Servers
    • configuration / Access to the IBM Notes Traveler Servers, Communication to the devices
    • location / Location of the IBM Notes Traveler Servers
    • deploying, to VPN connection / VPN connection
    • configuring, for creating security settings / Establishing appropriate security settings
  • IBM Tivoli Access Manager 6.0 / Reverse proxy
  • IBM Traveler / Messaging, calendar, and personal information management
  • IBM Traveler Server
    • direct connection, configuring to / Direct connection
  • IBM WebSphere Edge Server 6.1 / Reverse proxy
  • IBM WebSphere Proxy Server
    • about / IBM Mobile Connect
  • IC3 / Malware
  • ICCID
    • about / Identifying your phone – the numbers that set your device apart
  • iCloud / iPhone
    • URL, for downloading / iPhone
    • about / Apple backup
  • identity fraud
    • about / They are watching you…and they know your name
  • identity thieves
    • about / What's in it for the information thieves?
  • IIRC
    • about / Encryption on iOS
  • Ikee
    • about / Virus/worms/others
  • imbedded charge, extended warranty
    • about / Types of extended warranties
  • IMEI
    • about / Identifying your phone – the numbers that set your device apart
  • implied warranty
    • about / Basic terms
  • IMSI
    • about / Identifying your phone – the numbers that set your device apart
  • included, extended warranty
    • about / Types of extended warranties
  • Indeed.com
    • about / The Internet
  • information management
    • about / Messaging, calendar, and personal information management
  • iNotes
    • about / IBM Mobile Connect
  • installation, antivirus software
    • on smartphones / Antivirus software on smartphones
  • installation, component / The hidden world (some advanced information)
  • installation, MDM / Does your company trust your device?, Details of MDM
  • installed applications
    • reviewing / Leveraging MDM for application management
  • Instant Messaging
    • about / Collaboration and corporate applications
  • instant messaging (IM)
    • about / Text messaging, chatting, and video chatting
  • internet
    • social networking / Social networking
  • Internet
    • about / The Internet
    • history / The Internet
  • internet chatting
    • about / Chat and texting solutions
  • Internet Crime Complaint Center (IC3)
    • about / Steps you can take to protect yourself
  • Internet Engineering Task Force
    • about / CueCats and QR codes
  • inventory management
    • about / Specific management of the device
  • iOS
    • about / The difference between Android and iOS, The difference between Android and iOS
    • differentiating, with Android / The difference between Android and iOS, The difference between Android and iOS
    • differentiating, with Android operating system / The difference between Android and iOS
    • mobile security features / The mobile user's security
    • data encryption / Encryption on iOS
  • IOS (Apple)
    • about / Jailbreak and rooting
  • iOS device
    • wiping / Wiping an iOS device
  • iOS devices / BYOD
    • list / Let's not forget Windows
  • iPhone
    • about / The iPhone – why every phone secretly wants to be a smartphone, SMS spoofing, Mobiles
  • iPhone 3G
    • about / The iPhone – why every phone secretly wants to be a smartphone, Mobiles
  • iPhone 4S
    • about / Mobiles
  • iPhone configuration tools
    • about / iPhone configuration tools
  • iPhone configuration utility
    • about / Identifying your phone – the numbers that set your device apart
  • iPhone Configurator
    • about / Identifying your phone – the numbers that set your device apart
    • URL / Identifying your phone – the numbers that set your device apart
  • iPhone configurator
    • using / iPhone configuration tools
    • URL / iPhone configuration tools
  • iPhone device
    • preventative measures, for hacking / iPhone
  • iPod
    • about / Mobiles
  • iTunes
    • about / Apple backup

J

  • J2ME
    • about / Making a smartphone smart
  • jailbreak
    • about / Jailbreak and rooting
  • jailbreaking
    • about / Think twice before jailbreaking or rooting, Glossary
  • Jupiter Networks
    • about / Touch, but don't break

K

  • Kaspersky
    • about / The dangers of mobile computers
  • key
    • about / Data encryption
  • keyloggers attack
    • about / Types of phishing
  • Kryptos
    • about / Encryption on iOS

L

  • legitimate programs
    • about / Understanding legitimate programs
  • licensing information, IBM Notes Traveler
    • about / Licensing information for IBM Notes Traveler
  • lifetime warranty
    • about / Basic terms
  • LinkedIn
    • about / The Internet, Social networking
  • location-based marketing
    • about / Who has your data? Round 3…
  • location-based marketing, type
    • check-in services / Who has your data? Round 3…
  • location-based services (LBS)
    • about / The mobile user's security
  • longer password
    • creating / Longer and varied passwords
  • Lookout Mobile Security
    • example, of toll fraud / Toll fraud
  • Loozfon
    • about / Malware
  • lost coverage
    • about / Extended warranty coverage
  • lost devices
    • wiping / Stolen or lost devices

M

  • mail routing server
    • about / The hidden world (some advanced information)
  • mail servers
    • about / Location of the IBM Notes Traveler Servers
    • location / Location of the mail servers
  • malfunction
    • addressing, to customer service representatives / How to make the most of your time while on the line
    • describing, to customer service representatives / Do not skip steps when describing your problem
    • unresolved / What to do if your malfunction has not been resolved
    • determining, for BYOD / BYOD
  • malicious app, downloading
    • precautions / Verifying that an application is legitimate
  • malware
    • about / They are watching you…and they know your name, A prediction of the future (and the lottery numbers for next week) scams, Malware
    • used, for infecting smartphones / What's in it for the information thieves?
    • Loozfon / Malware
    • mobile device, attacking / Malware
    • FinFisher / Malware
    • toll fraud / Toll fraud
    • FakeInst / Toll fraud
    • SMS spoofing / SMS spoofing
  • malware-based phishing
    • about / Types of phishing
  • malware attacks
    • unawareness / A widespread lack of awareness
  • malwares
    • used, for hacking smartphones / Malware and viruses
  • manufacturer
    • about / OS operators, manufacturers, and service providers
    • contacting, for hardware malfunction / Hardware
  • manufacturer warranty
    • about / Basic terms
  • McAfee
    • about / The dangers of mobile computers
    / Antivirus software on smartphones
  • MDM
    • installing / Does your company trust your device?, Details of MDM
    • about / Does your company trust your device?, Details of MDM, The hidden world (some advanced information), Glossary
    • used, for protecting frontend network / Does your company trust your device?
    • benefits / MDM end user benefits and impacts
    • features / MDM end user benefits and impacts
    • used, for securing corporate data / Consumer-focused devices
    • elements / Elements of device management
    • functions / Specific management of the device
    • leveraging, for application management / Leveraging MDM for application management
    / Rules
  • MDM products
    • about / MDM solutions and products
  • MDM solution
    • about / Determine if a pure MDM solution is required in the environment
    • determining / Determine if a pure MDM solution is required in the environment
  • MDM solutions
    • availability / Potential solutions
  • MEID
    • about / Identifying your phone – the numbers that set your device apart
  • message boards
    • about / Text messaging, chatting, and video chatting
  • messaging server
    • about / The hidden world (some advanced information)
  • Microsoft / BYOD
    • about / Let's not forget Windows
  • Microsoft 365 Apps / Cloud computing security
  • Microsoft ActiveSync technology / Types of devices in the environment
  • Microsoft Exchange Server / Messaging, calendar, and personal information management
  • Microsoft Instant Messenger (MSN) / Text messaging, chatting, and video chatting
  • Microsoft System Manager / Determine if a pure MDM solution is required in the environment
  • mobiGlobal Positioning System (GPS) / Future threats
  • Mobile Acceptable Use policy
    • about / BYOD
  • Mobile Acceptable Use Policy
    • corporate device / Company owned devices
  • Mobile Acceptable Use Policy (MAUP)
    • about / Mobile device acceptable use policy, Company owned devices
    • purpose / Overview
    • applicability / Policy applicability
    • disciplinary action / Disciplinary action
  • Mobile Backup & Restore Tool
    • URL / Android backup
  • Mobile Backup II
    • URL / Android backup
  • mobile banking
    • about / Mobile finance – buying and selling in the mobile marketplace, Will your money be "too" mobile?
    • security measures / Will your money be "too" mobile?
  • mobile communication
    • about / Text messaging, chatting, and video chatting
  • mobile communications devices
    • about / Mobile information
  • mobile cybercrime
    • about / A prediction of the future (and the lottery numbers for next week) scams
  • mobile device
    • buying / Buying your device
    • operating system / Jailbreak and rooting
    • accessing, to corporate network / The hidden world (some advanced information)
    • used, for online shopping / Who has your data? The final stretch…
    • security threats / A prediction of the future (and the lottery numbers for next week) scams, Summing it up
    • attacking, malware used / Malware
    • infecting, FakeInst used / Toll fraud
    • concerns / The mobile user's security
    • future threats / Future threats
    • protection guidelines / Steps you can take to protect yourself
    • identifying, SIM used / Identifying your phone – the numbers that set your device apart
    • hacking / In the event that your device has been compromised
    • benefits / The boom in baby boomers
    • device profile / Device profiles
    • backup / The Apple profile
    • restore / The Apple profile
    • connecting, to IBM Notes Traveler Server via VPN connection / VPN connection
  • mobile device, hacking
    • verifying / Has your device been hacked?
    • social engineering / Social engineering
    • preventative steps / Summing up
  • mobile device, identifiers
    • IMEI / Identifying your phone – the numbers that set your device apart
    • ICCID / Identifying your phone – the numbers that set your device apart
    • IMSI / Identifying your phone – the numbers that set your device apart
    • eCID / Identifying your phone – the numbers that set your device apart
    • MEID / Identifying your phone – the numbers that set your device apart
  • mobile device, type
    • personal / The device type (BYOD or the corporate device)
    • BYOD / The device type (BYOD or the corporate device)
  • Mobile Device Management
    • about / Establishing appropriate security settings
  • Mobile Device Management (MDM)
    • about / Review of the IBM Notes Traveler Server
  • Mobile Device Management functionality
    • about / The architectural design of the IBM Notes Traveler service
  • Mobile Device Management Software / Potential solutions
  • Mobile Device Management tool
    • about / BYOD
  • mobile devices
    • used, for business access / Mobile and business
    • about / Good idea, mixed results
    • benefits / Good idea, mixed results
    • using, at workplace / Bring your mobile device to work day
    • users, types / Mobile information
  • MobileIron
    • URL / MDM solutions and products
  • mobile malware
    • about / Malware
  • mobile operating systems
    • iOS / Operating system or user interface
    • Android / Operating system or user interface
    • Windows / Operating system or user interface
  • mobile purchasing
    • about / Mobile purchasing and identification methods – who needs credit cards?
    • CueCat / CueCats and QR codes
    • Personal QR Code / CueCats and QR codes
  • mobiles
    • history / Mobiles
  • mobile security
    • features / The mobile user's security
  • mobile security compromise
    • resolving / Summing it up
  • mobile security policies
    • about / Mobile security policies in the environment
    • corporate data / Corporate data and information
    • data communication / Network/communications
    • devices / Devices
    • government regulations / Legal requirements and government regulations
  • mobile shopping
    • about / Who has your data? The final stretch…
  • mobile threats
    • about / A prediction of the future (and the lottery numbers for next week) scams
  • mobile user
    • communicating, corporate applications used for / Collaboration and corporate applications
  • Monkey Jump 2
    • about / Verifying that an application is legitimate
  • Monster
    • about / The Internet
  • MSN Money
    • about / What's in it for the information thieves?
  • Multimedia Messaging Service (MMS) / Virus/worms/others
  • multiyear plan considerations
    • about / Extended warranty considerations
  • Myspace
    • about / Social networking

N

  • National White Collar Crime Center (NW3C) / Steps you can take to protect yourself
  • News Corporation
    • about / The truth is out there
  • newsgroups
    • about / Text messaging, chatting, and video chatting
  • Nokia / BYOD, Mobiles
  • Nokia Lumia / BYOD
  • normal use warranty
    • about / Basic terms
  • Norton / Antivirus software on smartphones
  • NRPC 1352
    • about / Reverse proxy, VPN connection

O

  • online chatting
    • about / Text messaging, chatting, and video chatting
  • online communication
    • about / Text messaging, chatting, and video chatting
    • history / Text messaging, chatting, and video chatting
    • e-mail / Text messaging, chatting, and video chatting
    • message boards / Text messaging, chatting, and video chatting
    • newsgroups / Text messaging, chatting, and video chatting
  • online payments
    • about / Who has your data? The final stretch…
  • online shopping
    • mobile decive, used for / Who has your data? The final stretch…
  • operating system
    • about / Jailbreak and rooting
  • operating system developer
    • contacting, for software error / Operating system or user interface
  • OS management
    • about / Access control
  • OS operators
    • about / OS operators, manufacturers, and service providers

P

  • Pandora
    • about / The truth is out there
  • Paper Toss. Studies
    • about / The truth is out there
  • partial wipe
    • about / To wipe or not to wipe – partial or complete
  • passfault
    • URL / Longer and varied passwords
    • about / Longer and varied passwords
  • password
    • modifying / Changing passwords
  • password attacker
    • about / Longer and varied passwords
  • password cracker
    • about / Longer and varied passwords
  • password management
    • about / Safety in numbers – passwords and user IDs, Access control
  • password meter
    • about / Longer and varied passwords
    • URL / Longer and varied passwords
  • password policies
    • about / Management of data on the device
  • passwords
    • obtaining / Passwords that work
  • payload
    • about / iPhone configuration tools
  • payment
    • collecting, smartphones used for / Text messaging, chatting, and video chatting
  • persistent cookies
    • about / Cookies, cookies everywhere
  • personal computers
    • smartphones, comparing to / They are watching you…and they know your name
  • Personal Computers (PC) / Does your company trust your device?
  • personal customer support system
    • about / Customer support by phone
  • personal device
    • reset / The device type (BYOD or the corporate device)
  • Personal Identification Number (PIN) / Buying your device
  • personal information
    • stealing / They are watching you…and they know your name, What's in it for the information thieves?
    • selling / What's in it for the information thieves?
    • collecting, by Carrier IQ app / The fallout
    • collecting, Carrier IQ app used / The truth is out there
    • collecting / Who has your data? The final stretch…
    • protecting / Steps you can take to protect yourself
  • Personal QR Code
    • about / CueCats and QR codes
  • phishing
    • about / Phishing
  • phishing, types
    • malware-based phishing / Types of phishing
    • deceptive phishing / Types of phishing
    • DNS-based phishing (pharming) / Types of phishing
    • Content Injection phishing / Types of phishing
    • data theft / Types of phishing
    • search engine phishing / Types of phishing
  • phreaking
    • about / Toll fraud
  • pod2g
    • URL / SMS spoofing
  • power user
    • about / Power users
    • tools / Power user tools
  • predictive analytics
    • about / Who has your data? The final stretch…
  • premium-rate SMS malware
    • about / Toll fraud
  • premium service abuser
    • about / Toll fraud
  • privacy
    • about / The mobile user's security
  • privileged user access
    • about / Cloud security
  • product defects coverage
    • about / Extended warranty coverage
  • professional networking sites
    • about / The Internet
  • profile hacks
    • about / Knowing the difference – device hacks, profile hacks, or both
    • differentiating, with device hacks / Knowing the difference – device hacks, profile hacks, or both
  • Pumpkin Maker
    • about / The truth is out there

Q

  • QR boxes
    • reading / CueCats and QR codes
    • usage / CueCats and QR codes
  • QR code
    • creating / CueCats and QR codes
  • QR code generator
    • URL / CueCats and QR codes
  • QR reader app / CueCats and QR codes
  • Quick Response Code (QR Code)
    • about / CueCats and QR codes

R

  • Real Time Operating Systems (RTOS) / Making a smartphone smart
  • recommended applications
    • about / Leveraging MDM for application management
  • Red Hat 6 / Licensing information for IBM Notes Traveler
  • remote lock
    • about / Management of data on the device
  • restore, Apple device
    • about / Apple backup
  • restore, mobile device
    • about / The Apple profile
  • retailers
    • customer location, tracking / Who has your data? Round 3…
  • reverse proxy
    • about / The hidden world (some advanced information), Connection methodologies to the Traveler servers, Reverse proxy
  • RIM Blackberry Devices / Types of devices in the environment
  • rooting
    • about / Jailbreak and rooting, Think twice before jailbreaking or rooting
  • Rovio
    • about / The truth is out there

S

  • @ symbol / The Internet
  • Safe Harbor Act / Cloud security
  • SafeSearch
    • about / Texting, sexting, and the Internet
  • Sale of Goods ACT / Basic terms
  • Salt Lake City
    • about / Mobile finance – buying and selling in the mobile marketplace
  • Samsung
    • URL, for online assistant / The device type (BYOD or the corporate device)
    / BYOD
  • Samsung Galaxy S / Mobiles
  • Samsung Galaxy S3 / BYOD
  • screenloggers attack
    • about / Types of phishing
  • search engine
    • about / The Internet
  • search engine phishing
    • about / Types of phishing
  • security
    • about / The mobile user's security
  • security compliance
    • about / Cloud security
  • security policy
    • about / Management of data on the device
  • security settings
    • creating / Establishing appropriate security settings
  • security threats
    • about / A prediction of the future (and the lottery numbers for next week) scams
  • selective wipe
    • about / Management of data on the device
  • service providers
    • about / OS operators, manufacturers, and service providers
  • session cookie
    • about / Cookies, cookies everywhere
  • sexting
    • about / Texting, sexting, and the Internet
  • sexually explicit text message (sext)
    • about / Texting, sexting, and the Internet
  • Short Message Service (SMS)
    • about / Communication to the devices, Text messaging, chatting, and video chatting
  • short message service (SMS) / The truth is out there
  • SIM
    • used, for identifying mobile device / Identifying your phone – the numbers that set your device apart
    • about / Identifying your phone – the numbers that set your device apart
  • SIM card
    • about / Identifying your phone – the numbers that set your device apart
  • Simple tether configuration tool
    • about / Simple tether configuration tool
  • Skulls
    • about / Virus/worms/others
  • Skype / Text messaging, chatting, and video chatting
  • SLA
    • about / The Service Level Agreement (SLA)
  • SlideShare / Cloud computing security
  • SmartMan
    • URL / MDM solutions and products
  • smartphone
    • using / Troy and You
    • preventative measures, for hacking / For any device
  • smartphone activities
    • tracking / 2012 is the new 1984 – how companies track us
  • smartphone revolution
    • precursors / Precursors to the smartphone revolution – Internet, social-networking, and spam
  • smartphones
    • risks / The dangers of mobile computers
    • hacking, malware used / Malware and viruses
    • hacking, viruses used / Malware and viruses
    • revolutionizing / The new mobile world
    • features / Making a smartphone smart
    • operating systems / Making a smartphone smart
    • cloud computing, designing for data retrieval / The cloud
    • personal computers, comparing to / They are watching you…and they know your name
    • infecting, malware used / What's in it for the information thieves?
    • reach out / Reach out and touch
    • protecting, from hackers / Preventative measures – how to reduce the likelihood that your device will be hacked
    • preventative measures, for hacking / Preventative measures – how to reduce the likelihood that your device will be hacked
    • accessing, through SMS messaging attacks / SMS messaging attacks
    • used, for conducting company business / The smartphone – a personal device, a company device, or both?
    • hardware issue / Other device issues
    • operating system error / Operating system or user interface
    • warranties / Warranties in the mobile space
    • maintaining / Summing it up
    • replacing / Summing it up
    • categories / Definitions
    • used, for collecting payment / Text messaging, chatting, and video chatting
  • SMS messaging attacks
    • accessing / SMS messaging attacks
    • smartphones, accessing through / SMS messaging attacks
  • SMS spoofing
    • about / SMS spoofing
    • implementing / SMS spoofing
    • impacts / SMS spoofing
  • SMS text messaging
    • about / SMS text
  • social engineering
    • about / Social engineering, Social engineering
    • phishing / Social engineering
    • spear phishing / Social engineering, Spear phishing
  • social networking
    • about / Social networking
  • social networking site
    • about / Social networking, Social networking
    • Classmates.com / Social networking, Social networking
    • Geocities / Social networking, Social networking
    • history / Social networking, Social networking
    • Facebook / Social networking, Social networking
    • Friendster / Social networking, Social networking
    • Twitter / Social networking
    • Tripod / Social networking
    • Myspace / Social networking
    • LinkedIn / Social networking
  • social networking sites
    • tracking / Facebook and customer tracking
  • software and applications coverage
    • about / Extended warranty coverage
  • software error
    • operating system developer, contacting for / Operating system or user interface
  • Sony / Mobiles
  • spam
    • about / The Internet
  • spear phishing
    • about / Spear phishing
    • working / How spear phishing works
    • examples / Other examples, Using your web presence against you, Passwords that work, Patches, updates, and security software, Cloud computing security
  • Sprint / Hidden "features"
  • SpyEye
    • about / Virus/worms/others
  • stolen devices
    • wiping / Stolen or lost devices
  • strangers
    • chatting, with children / Strangers and dangers
  • strong password
    • creating / Using strong passwords
    • using / Using strong passwords
    • technique / Longer and varied passwords
  • SUSE 11 / Licensing information for IBM Notes Traveler
  • Symantec Report / A prediction of the future (and the lottery numbers for next week) scams
  • synchronization
    • about / Access control
  • system reconfiguration attacks
    • about / Types of phishing

T

  • T-Mobile / Hidden "features"
  • technical support
    • contacting / How to get the most out of your technical support experience if you have a malfunction
  • technical support, contacting
    • checklist / Before you make the call – information, password problems, and your malfunction
  • technical support parties
    • about / OS operators, manufacturers, and service providers
    • OS operators / OS operators, manufacturers, and service providers
    • manufacturer / OS operators, manufacturers, and service providers
    • service providers / OS operators, manufacturers, and service providers
  • technology
    • influences, on young generation / Colliding generations
  • Telegraph
    • URL / Who has your data? The final stretch…
  • telephone
    • about / Mobiles
  • texting
    • about / Texting, sexting, and the Internet
  • text messages
    • about / Text messaging, chatting, and video chatting
  • TextPlus4
    • about / The truth is out there
  • threats, mobile device
    • malware / Malware
    • social engineering / Social engineering
    • virus / Virus/worms/others
  • toll fraud
    • about / Toll fraud
  • tools, power user
    • about / Power user tools
    • iPhone configuration / iPhone configuration tools
    • Android configuration / Android configuration tools
  • traveler servers
    • about / Location of the mail servers
    • configuration / Connection methodologies to the Traveler servers
  • Trend Micro Mobile Backup and Restore
    • URL / Android backup
  • Tripod
    • about / Social networking
  • Trojan
    • smartphones, accessing through SMS messaging attacks / SMS messaging attacks
  • Twitter
    • about / Social networking
    / The Internet
  • two-factor authentication / Steps you can take to protect yourself

U

  • U.S. Department of Justice / They are watching you…and they know your name
  • UCC
    • about / Basic terms, Extended warranty considerations
    • URL / Basic terms
  • United States Department of Justice (US DoJ) / Who has your data? Round 2…
  • United States Federal Bureau of Investigation (FBI) / Steps you can take to protect yourself
  • updates and compliance
    • about / Specific management of the device
  • URL (Uniform Resource Locator)
    • about / The Internet
  • users
    • personal information, sharing on social networking site / The two-way street of social networking

V

  • varied password
    • creating / Longer and varied passwords
  • VentureBeat
    • example / Toll fraud
  • verbal, extended warranty
    • about / Types of extended warranties
  • video chatting
    • about / Text messaging, chatting, and video chatting
  • Virtual Private Network (VPN)
    • about / iPhone configuration tools
  • virus
    • about / Virus/worms/others
  • viruses
    • used, for hacking smartphones / Malware and viruses
  • VPN
    • about / VPN connection
    • using / Specific management of the device
  • VPN connection
    • IBM Notes Traveler Server, deploying to / VPN connection
    • configuration / VPN connection
  • VPN technology
    • about / Connection methodologies to the Traveler servers

W

  • Wall Street Journal (WSJ)
    • about / The truth is out there
  • warranties, smartphones / Warranties in the mobile space, Warranties
    • manufacturer warranty / Basic terms, Warranties
    • lifetime warranty / Basic terms, Warranties
    • normal use / Basic terms
    • extended warranty / Basic terms, Warranties
    • implied warranty / Basic terms
    • As is / Basic terms
    • cell phone insurance / Basic terms, Warranties
    • utilization / Navigating the web of warranties
    • standard warranty / Warranties
    • insurance / Warranties
  • weak password
    • about / Longer and varied passwords
  • Whatsapp / Text messaging, chatting, and video chatting
  • Wi-Fi
    • using / Specific management of the device
  • Windows 8
    • about / Let's not forget Windows
  • Windows Live ID
    • about / Let's not forget Windows
  • Windows Live PC
    • about / Let's not forget Windows
  • Windows Mobile
    • about / Jailbreak and rooting
  • Windows Phones / BYOD
  • Windows RT
    • about / Licensing information for IBM Notes Traveler
  • Windows Server 12 / Licensing information for IBM Notes Traveler
  • Windows Store
    • about / Let's not forget Windows
  • wireless internet
    • about / The Internet
  • workplace
    • mobile devices, using at / Bring your mobile device to work day
  • World Wide Web
    • about / The Internet
  • written statement considerations
    • about / Extended warranty considerations

X

  • XCode Organizer
    • about / Identifying your phone – the numbers that set your device apart
  • XML (Extensible Markup Language)
    • about / iPhone configuration tools

Y

  • Yahoo!
    • about / The Internet
  • young generation
    • technology, influences / Colliding generations
  • Youtube / The Internet

Z

  • ZDNet
    • about / Safety in numbers – passwords and user IDs
  • Zeus
    • about / Virus/worms/others
  • ZitMo
    • about / Virus/worms/others