Index
A
- access control
- about / Access control
- ACLU
- about / Who has your data? Round 2…
- ACME Anvil Corporation / Buying your device
- AIM (Aol Instant Messenger)
- Airwatch
- Altavista
- about / The Internet
- Amazon.com / 2012 is the new 1984 – how companies track us
- Amazon Web Service / The cloud
- Android
- about / The difference between Android and iOS, Jailbreak and rooting, The difference between Android and iOS
- differentiating, with iOS / The difference between Android and iOS, The difference between Android and iOS
- mobile security features / The mobile user's security
- data encryption / Encryption on Android
- Android@Home technology / The difference between Android and iOS
- Android configuration tools
- about / Android configuration tools
- configuration tool / Configuration
- simple tether configuration tool / Simple tether configuration tool
- simple router configuration tool / Simple router configuration
- Lookout / Lookout
- quick settings / Quick settings
- Android device
- preventative measures, for hacking / Android
- wiping / Wiping an Android device
- backup / Android backup
- Android devices
- apps, downloading to / Touch, but don't break
- list / Let's not forget Windows
- Android Lost app / Wiping an Android device
- Android operating system
- differentiating, with iOS / The difference between Android and iOS
- Android profile
- about / The Android profile
- Android spartphones
- about / Reach out and touch
- antivirus software
- installing, on smartphones / Antivirus software on smartphones
- AOL
- about / The Internet
- Apple / The iPhone – why every phone secretly wants to be a smartphone, The Apple profile, BYOD
- future plans / And now the rest of the story
- URL, for online assistant / The device type (BYOD or the corporate device)
- Apple App store / Toll fraud
- Apple App Store
- about / Downloaded applications
- Apple device
- backup / Apple backup
- restore / Apple backup
- Apple devices
- apps, downloading to / Touch, but don't break
- Apple iCloud / Cloud computing security
- Apple iPhone
- about / Reach out and touch
- Apple iTunes application / Android backup
- Apple profile
- about / The Apple profile
- applicability, Mobile Acceptable Use Policy (MAUP)
- rules / Rules
- application
- authenticity, verifying / Verifying that an application is legitimate
- application developer
- contacting, for application issues / Application issues
- application downloads
- device, accessing through / Attacks through attachment and application downloads
- application issues
- application developer, contacting for / Application issues
- application malfunction
- about / Application issues
- verifying / Application issues
- application management
- MDM, leveraging for / Leveraging MDM for application management
- application servers
- apps
- downloading, to Android devices / Touch, but don't break
- downloading, to Apple devices / Touch, but don't break
- hidden features / Hidden "features"
- scanning, Bouncer used / And now the rest of the story
- App Store
- about / Touch, but don't break, Mobiles
- Archie
- about / The Internet
- As-is considerations
- about / Extended warranty considerations
- As is warranty
- about / Basic terms
- AT&T / Hidden "features"
- attachment
- device, accessing through / Attacks through attachment and application downloads
- AUP
- about / Acceptable use policy (AUP)
- basic format / Acceptable use policy (AUP)
- automated customer support system
- about / Customer support by phone
B
- backup, Android device
- about / Android backup
- backup, Apple device
- about / Apple backup
- backup, mobile device
- about / The Apple profile
- backup tools, Android
- Mobile Backup II / Android backup
- barcode
- about / CueCats and QR codes
- Bell System telephone
- about / Reach out and touch
- BlackBerry / Mobile and business
- Blackberry / Mobiles
- Blackberry Enterprise Server / Messaging, calendar, and personal information management, Elements of device management
- Blackberry Enterprise Server (BES) 10 / Licensing information for IBM Notes Traveler
- Bouncer
- about / And now the rest of the story
- used, for scanning apps / And now the rest of the story
- bouncer
- BREW
- about / Making a smartphone smart
- BYOD
- used, for connecting to corporate network / Mobile Device Management
- about / Toby's story, Definitions, The device type (BYOD or the corporate device), BYOD, Consumer-focused devices, Glossary
- maintenance / The smartphone – a personal device, a company device, or both?
- malfunction, determining / BYOD
C
- car-phone
- about / Mobiles
- Carbonite / Cloud computing security
- Carrier IQ
- about / Hidden "features"
- Carrier IQ app
- personal information, collecting by / The fallout, The truth is out there
- Cellcrypt
- about / Encryption on iOS
- cell phone
- tracking / Who has your data? Round 2…
- cell phone insurance
- about / Basic terms
- cell phone ownership
- cell phones
- about / Mobiles
- cellular
- certificate management
- about / Access control
- Chase
- chatting
- check-in services
- about / Who has your data? Round 3…
- children, chatting
- risks / Strangers and dangers
- Classmates.com / Social networking
- closed systems
- about / Jailbreak and rooting
- cloud computing
- about / The cloud, Cloud computing security
- designing, for data retrieval / The cloud
- risks / The risks of cloud computing
- architecture / How it works
- working / How it works
- cloud computing, architecture
- frontend / How it works
- network layer / How it works
- backend / How it works
- cloud security
- about / How it works, Cloud security
- data location / Cloud security
- data segregation / Cloud security
- privileged user access / Cloud security
- security compliance / Cloud security
- disaster recovery (DR) / Cloud security
- CommWarrior
- about / Virus/worms/others
- companies
- demographic information, collecting / 2012 is the new 1984 – how companies track us
- smartphone activities, tracking / 2012 is the new 1984 – how companies track us
- computer activities, tracking / 2012 is the new 1984 – how companies track us
- company business
- conducting, smartphones used for / The smartphone – a personal device, a company device, or both?
- complete wipe
- about / Management of data on the device
- component
- installing, to protect end users / The hidden world (some advanced information)
- installing, to protect corporate network / The hidden world (some advanced information)
- installing, to protect corporate data / The hidden world (some advanced information)
- compromised login information
- protecting / Compromised accounts
- CompuServe
- about / The Internet
- computer activities
- concerns, mobile device
- security / The mobile user's security
- privacy / The mobile user's security
- configuration, IBM Notes Traveler
- about / Overview of different clients
- configuration profile
- about / iPhone configuration tools
- consumer-based applications
- about / Generally available applications
- consumer-focused devices
- about / Consumer-focused devices
- Content Injection phishing / Types of phishing
- cookies
- about / Cookies, cookies everywhere
- session cookie / Cookies, cookies everywhere
- persistent cookies / Cookies, cookies everywhere
- corporate access
- device, enabling for / Procedure to enable a device for corporate access
- corporate applications
- used, for communicating among mobile users / Collaboration and corporate applications
- managing / Leveraging MDM for application management
- distributing / Leveraging MDM for application management
- corporate collaborative environment
- corporate communication
- devices, used for / Consumer-focused devices
- corporate communication devices
- corporate computing
- about / Mobile Device Management
- corporate computing enterprise
- about / Details of MDM
- corporate data
- about / Does your company trust your device?, Corporate data and information
- security concern / Does your company trust your device?
- protecting, component installed / The hidden world (some advanced information)
- securing, MDM used for / Consumer-focused devices
- corporate device, Mobile Acceptable Use Policy
- about / Company owned devices
- overview / Overview
- rules / Rules
- disciplinary action / Disciplinary action
- corporate help desks
- about / Power users
- Corporate IT Security policies / Types of devices in the environment
- corporate network
- connecting, BYOD used / Mobile Device Management
- mobile device, accessing to / The hidden world (some advanced information)
- protecting, component installed / The hidden world (some advanced information)
- corporate owned device
- about / Glossary
- corporate security policy
- about / Corporate security policies
- corporate security procedures
- about / Corporate security procedures
- correct deployment approach
- determining / Determining the correct deployment approach
- cost based on a recurring charge, extended warranty
- about / Types of extended warranties
- cost considerations
- about / Extended warranty considerations
- CueCat
- about / CueCats and QR codes
- customer concerns
- addressing / The Service Level Agreement (SLA)
- customer issues
- resolving, through customer support systems / The wide world of customer service and technical support
- customer location
- tracking / Who has your data? Round 3…
- customer service, contacting
- customer service, guidelines
- customer service representatives
- malfunction, addressing to / How to make the most of your time while on the line
- about / Answer every question
- answering / Answer every question
- malfunction, describing to / Do not skip steps when describing your problem
- customer support system
- automated operation / Customer support by phone
- hybrid operation / Customer support by phone
- internet chatting / Chat and texting solutions
- SMS text messaging / SMS text
- customer support systems
- customer issues, resolving through / The wide world of customer service and technical support
- about / Customer support in the mobile space – phone, chat, and text
- personal operation / Customer support by phone
- cyberbullying
- about / And unlimited damage
- signs / And unlimited damage
D
- damage coverage
- about / Extended warranty coverage
- data
- about / Data good enough to steal, Management of data on the device
- corporate data / Management of data on the device
- personal data / Management of data on the device
- data-at-rest
- about / Data encryption
- data-in-transit
- about / Data encryption
- data-in-use
- about / Data encryption
- data encryption
- about / Data encryption
- data encryption, Android
- about / Encryption on Android
- drawbacks / Encryption on Android
- data encryption, iOS
- about / Encryption on iOS
- data location
- data management
- about / Management of data on the device
- data segregation
- about / Cloud security
- data theft
- data thieves
- about / And that's only the first part…
- deceptive phishing
- about / Types of phishing
- demographic information
- collecting / 2012 is the new 1984 – how companies track us
- Developer Distribution Agreement
- about / Touch, but don't break
- device
- accessing, through application downloads / Attacks through attachment and application downloads
- accessing, through attachment / Attacks through attachment and application downloads
- testing / Test your device
- wiping / To wipe or not to wipe – partial or complete
- data / Management of data on the device
- data management / Management of data on the device
- access control, within corporate environment / Access control
- enabling, for corporate access / Procedure to enable a device for corporate access
- device, wiping
- decision making / To wipe or not to wipe – partial or complete
- full wipe / To wipe or not to wipe – partial or complete
- partial wipe / To wipe or not to wipe – partial or complete
- device hacks
- unawareness / Have you been hacked?
- indication / Have you been hacked?
- about / Knowing the difference – device hacks, profile hacks, or both
- differentiating, with profile hacks / Knowing the difference – device hacks, profile hacks, or both
- post actions / In the event of a hack, Who to contact, Summing it up
- addressing / BYOD
- checklist / What to do and when to do it – a list in the event that you've been hacked
- device profile
- about / Device profiles
- Apple profile / The Apple profile
- Android profile / The Android profile
- devices
- types / Types of devices in the environment
- used, for corporate communication / Consumer-focused devices
- devices, types
- consumer-focused devices / Consumer-focused devices
- device type
- determining / Determining the types of devices that will be supported
- about / Access control
- Digby / Who has your data? The final stretch…
- Digital Convergence Corporation / CueCats and QR codes
- digital identity
- about / Troy and You
- digital information
- about / Troy and You
- direct connection
- configuring, to IBM Traveler Server / Direct connection
- disaster recovery (DR)
- about / Cloud security
- disciplinary action
- about / Disciplinary action, Disciplinary action
- DMZ
- DNS-based phishing (pharming)
- about / Types of phishing
- Domain Name System (DNS) / Types of phishing
- Domino Directory Assistance / Location of the IBM Notes Traveler Servers
- Domino Servers
- DoSomething.org / And unlimited damage
- downloaded applications
- about / Downloaded applications
- antivirus software, on smartphones / Antivirus software on smartphones
- DRM
- about / Digital Rights Management
- URL, for info / Digital Rights Management
- DroidKungFu
- about / Virus/worms/others
- Dropbox / Cloud computing security
- about / Generally available applications
- DWA
- about / IBM Mobile Connect
- DynaTAC
- about / Mobiles
E
- eCID
- elements, MDM
- about / Elements of device management
- Encrypted Backup setting
- about / iPhone
- encryption policies
- about / Management of data on the device
- end users
- protecting, component installed / The hidden world (some advanced information)
- Engadget
- Enterprise Database Architecture
- Erase Data function
- about / iPhone
- extended warranty
- about / Basic terms, Types of extended warranties
- considerations / Extended warranty considerations
- purchasing / To purchase an extended warranty or not?
- recommendations / In a nutshell
- extended warranty, considerations
- cost / Extended warranty considerations
- written statement / Extended warranty considerations
- As-is / Extended warranty considerations
- multiyear plan / Extended warranty considerations
- extended warranty, types
- about / Types of extended warranties
- verbal / Types of extended warranties
- included / Types of extended warranties
- cost based on a recurring charge / Types of extended warranties
- imbedded charge / Types of extended warranties
- extended warranty coverage
- about / Extended warranty coverage
- extended warranty coverage, types
- about / Extended warranty coverage
- product defects / Extended warranty coverage
- damage / Extended warranty coverage
- lost / Extended warranty coverage
- software and application / Extended warranty coverage
F
- Facebook
- about / Social networking, Social networking
- Facebook Beacon / Facebook and customer tracking
- Facebook members
- tracking / Facebook and customer tracking
- FakeInst
- about / Toll fraud
- mobile device, infecting / Toll fraud
- Fandango / Facebook and customer tracking
- file repositories
- Find my iPhone feature
- about / iPhone, Wiping an iOS device
- FinFisher / Malware
- about / Malware
- firewall
- Friendster
- about / Social networking, Social networking
- frontend network
- protecting, MDM used / Does your company trust your device?
- frontend network devices
- about / Frontend network protection
- FTC
- about / Facebook and customer tracking
- full wipe
- functions, MDM
G
- Gartner Magic Quadrant / Potential solutions
- Geinimi Trojan
- about / Malware and viruses
- Geocities / Social networking
- about / Social networking
- Gingerbread 2.3 / Virus/worms/others
- Gingermaster
- about / Virus/worms/others
- Gizmodo
- about / The fallout
- global positioning system (GPS)
- Global Positioning System (GPS)
- about / The mobile user's security
- Good Technology / Messaging, calendar, and personal information management
- Google / The difference between Android and iOS, BYOD
- future plans / And now the rest of the story
- about / The Internet
- Google Android Store
- about / Downloaded applications
- Google Docs / Cloud computing security
- Google Play
- about / Touch, but don't break
- Google Play Store / The difference between Android and iOS
- GPS (Global Positioning System)
- about / Malware and viruses
- Groupon application
- about / Phishing
H
- hacker
- device, accessing through attachments / Attacks through attachment and application downloads
- device, accessing through application downloads / Attacks through attachment and application downloads
- hackers
- smartphones, protecting from / Preventative measures – how to reduce the likelihood that your device will be hacked
- Hackerspace / CueCats and QR codes
- hardware malfunction
- manufacturer, contacting for / Hardware
- Health Insurance Portability and Accountability Act (HIPAA) / Legal requirements and government regulations
- hidden app
- benefits / Hidden "features"
- hidden features, apps
- about / Hidden "features"
- home office
- about / Mobile Device Management
- HTML injection
- about / Virus/worms/others
- Hulu / The Internet
- hybrid customer support system
- about / Customer support by phone
I
- IBM / Text messaging, chatting, and video chatting
- IBM Domino / Messaging, calendar, and personal information management
- IBM Domino Enterprise Server
- IBM Domino Server technology
- IBM Domino Server technology, component
- IBM Notes Traveler / Review of the IBM Notes Traveler Server
- IBM Endpoint Manager / Determine if a pure MDM solution is required in the environment
- IBM iSeries / Licensing information for IBM Notes Traveler
- IBM Lotus Mobile Connect 6.1 / Reverse proxy
- IBM Mobile Connect (IMC)
- about / IBM Mobile Connect
- IBM Notes Traveler
- architectural design / The architectural design of the IBM Notes Traveler service
- features / The architectural design of the IBM Notes Traveler service
- correct deployment approach, determining / Determining the correct deployment approach
- configuration / Overview of different clients
- clients / Overview of different clients
- licensing information / Licensing information for IBM Notes Traveler
- IBM Notes Traveler 9
- IBM Notes Traveler Server
- about / Access to the IBM Notes Traveler Servers
- configuration / Access to the IBM Notes Traveler Servers, Communication to the devices
- location / Location of the IBM Notes Traveler Servers
- deploying, to VPN connection / VPN connection
- configuring, for creating security settings / Establishing appropriate security settings
- IBM Tivoli Access Manager 6.0 / Reverse proxy
- IBM Traveler / Messaging, calendar, and personal information management
- IBM Traveler Server
- direct connection, configuring to / Direct connection
- IBM WebSphere Edge Server 6.1 / Reverse proxy
- IBM WebSphere Proxy Server
- about / IBM Mobile Connect
- IC3 / Malware
- ICCID
- iCloud / iPhone
- URL, for downloading / iPhone
- about / Apple backup
- identity fraud
- identity thieves
- IIRC
- about / Encryption on iOS
- Ikee
- about / Virus/worms/others
- imbedded charge, extended warranty
- about / Types of extended warranties
- IMEI
- implied warranty
- about / Basic terms
- IMSI
- included, extended warranty
- about / Types of extended warranties
- Indeed.com
- about / The Internet
- information management
- iNotes
- about / IBM Mobile Connect
- installation, antivirus software
- on smartphones / Antivirus software on smartphones
- installation, component / The hidden world (some advanced information)
- installation, MDM / Does your company trust your device?, Details of MDM
- installed applications
- reviewing / Leveraging MDM for application management
- Instant Messaging
- instant messaging (IM)
- internet
- social networking / Social networking
- Internet
- about / The Internet
- history / The Internet
- internet chatting
- about / Chat and texting solutions
- Internet Crime Complaint Center (IC3)
- Internet Engineering Task Force
- about / CueCats and QR codes
- inventory management
- iOS
- about / The difference between Android and iOS, The difference between Android and iOS
- differentiating, with Android / The difference between Android and iOS, The difference between Android and iOS
- differentiating, with Android operating system / The difference between Android and iOS
- mobile security features / The mobile user's security
- data encryption / Encryption on iOS
- IOS (Apple)
- about / Jailbreak and rooting
- iOS device
- wiping / Wiping an iOS device
- iOS devices / BYOD
- list / Let's not forget Windows
- iPhone
- iPhone 3G
- iPhone 4S
- about / Mobiles
- iPhone configuration tools
- about / iPhone configuration tools
- iPhone configuration utility
- iPhone Configurator
- iPhone configurator
- using / iPhone configuration tools
- URL / iPhone configuration tools
- iPhone device
- preventative measures, for hacking / iPhone
- iPod
- about / Mobiles
- iTunes
- about / Apple backup
J
- J2ME
- about / Making a smartphone smart
- jailbreak
- about / Jailbreak and rooting
- jailbreaking
- Jupiter Networks
- about / Touch, but don't break
K
- Kaspersky
- about / The dangers of mobile computers
- key
- about / Data encryption
- keyloggers attack
- about / Types of phishing
- Kryptos
- about / Encryption on iOS
L
- legitimate programs
- licensing information, IBM Notes Traveler
- lifetime warranty
- about / Basic terms
- LinkedIn
- about / The Internet, Social networking
- location-based marketing
- about / Who has your data? Round 3…
- location-based marketing, type
- check-in services / Who has your data? Round 3…
- location-based services (LBS)
- about / The mobile user's security
- longer password
- creating / Longer and varied passwords
- Lookout Mobile Security
- example, of toll fraud / Toll fraud
- Loozfon
- about / Malware
- lost coverage
- about / Extended warranty coverage
- lost devices
- wiping / Stolen or lost devices
M
- mail routing server
- mail servers
- about / Location of the IBM Notes Traveler Servers
- location / Location of the mail servers
- malfunction
- addressing, to customer service representatives / How to make the most of your time while on the line
- describing, to customer service representatives / Do not skip steps when describing your problem
- unresolved / What to do if your malfunction has not been resolved
- determining, for BYOD / BYOD
- malicious app, downloading
- precautions / Verifying that an application is legitimate
- malware
- about / They are watching you…and they know your name, A prediction of the future (and the lottery numbers for next week) scams, Malware
- used, for infecting smartphones / What's in it for the information thieves?
- Loozfon / Malware
- mobile device, attacking / Malware
- FinFisher / Malware
- toll fraud / Toll fraud
- FakeInst / Toll fraud
- SMS spoofing / SMS spoofing
- malware-based phishing
- about / Types of phishing
- malware attacks
- unawareness / A widespread lack of awareness
- malwares
- used, for hacking smartphones / Malware and viruses
- manufacturer
- about / OS operators, manufacturers, and service providers
- contacting, for hardware malfunction / Hardware
- manufacturer warranty
- about / Basic terms
- McAfee
- about / The dangers of mobile computers
- MDM
- installing / Does your company trust your device?, Details of MDM
- about / Does your company trust your device?, Details of MDM, The hidden world (some advanced information), Glossary
- used, for protecting frontend network / Does your company trust your device?
- benefits / MDM end user benefits and impacts
- features / MDM end user benefits and impacts
- used, for securing corporate data / Consumer-focused devices
- elements / Elements of device management
- functions / Specific management of the device
- leveraging, for application management / Leveraging MDM for application management
- MDM products
- about / MDM solutions and products
- MDM solution
- MDM solutions
- availability / Potential solutions
- MEID
- message boards
- messaging server
- Microsoft / BYOD
- about / Let's not forget Windows
- Microsoft 365 Apps / Cloud computing security
- Microsoft ActiveSync technology / Types of devices in the environment
- Microsoft Exchange Server / Messaging, calendar, and personal information management
- Microsoft Instant Messenger (MSN) / Text messaging, chatting, and video chatting
- Microsoft System Manager / Determine if a pure MDM solution is required in the environment
- mobiGlobal Positioning System (GPS) / Future threats
- Mobile Acceptable Use policy
- about / BYOD
- Mobile Acceptable Use Policy
- corporate device / Company owned devices
- Mobile Acceptable Use Policy (MAUP)
- about / Mobile device acceptable use policy, Company owned devices
- purpose / Overview
- applicability / Policy applicability
- disciplinary action / Disciplinary action
- Mobile Backup & Restore Tool
- URL / Android backup
- Mobile Backup II
- URL / Android backup
- mobile banking
- mobile communication
- mobile communications devices
- about / Mobile information
- mobile cybercrime
- mobile device
- buying / Buying your device
- operating system / Jailbreak and rooting
- accessing, to corporate network / The hidden world (some advanced information)
- used, for online shopping / Who has your data? The final stretch…
- security threats / A prediction of the future (and the lottery numbers for next week) scams, Summing it up
- attacking, malware used / Malware
- infecting, FakeInst used / Toll fraud
- concerns / The mobile user's security
- future threats / Future threats
- protection guidelines / Steps you can take to protect yourself
- identifying, SIM used / Identifying your phone – the numbers that set your device apart
- hacking / In the event that your device has been compromised
- benefits / The boom in baby boomers
- device profile / Device profiles
- backup / The Apple profile
- restore / The Apple profile
- connecting, to IBM Notes Traveler Server via VPN connection / VPN connection
- mobile device, hacking
- verifying / Has your device been hacked?
- social engineering / Social engineering
- preventative steps / Summing up
- mobile device, identifiers
- IMEI / Identifying your phone – the numbers that set your device apart
- ICCID / Identifying your phone – the numbers that set your device apart
- IMSI / Identifying your phone – the numbers that set your device apart
- eCID / Identifying your phone – the numbers that set your device apart
- MEID / Identifying your phone – the numbers that set your device apart
- mobile device, type
- Mobile Device Management
- Mobile Device Management (MDM)
- Mobile Device Management functionality
- Mobile Device Management Software / Potential solutions
- Mobile Device Management tool
- about / BYOD
- mobile devices
- used, for business access / Mobile and business
- about / Good idea, mixed results
- benefits / Good idea, mixed results
- using, at workplace / Bring your mobile device to work day
- users, types / Mobile information
- MobileIron
- mobile malware
- about / Malware
- mobile operating systems
- iOS / Operating system or user interface
- Android / Operating system or user interface
- Windows / Operating system or user interface
- mobile purchasing
- about / Mobile purchasing and identification methods – who needs credit cards?
- CueCat / CueCats and QR codes
- Personal QR Code / CueCats and QR codes
- mobiles
- history / Mobiles
- mobile security
- features / The mobile user's security
- mobile security compromise
- resolving / Summing it up
- mobile security policies
- about / Mobile security policies in the environment
- corporate data / Corporate data and information
- data communication / Network/communications
- devices / Devices
- government regulations / Legal requirements and government regulations
- mobile shopping
- mobile threats
- mobile user
- communicating, corporate applications used for / Collaboration and corporate applications
- Monkey Jump 2
- Monster
- about / The Internet
- MSN Money
- Multimedia Messaging Service (MMS) / Virus/worms/others
- multiyear plan considerations
- about / Extended warranty considerations
- Myspace
- about / Social networking
N
- National White Collar Crime Center (NW3C) / Steps you can take to protect yourself
- News Corporation
- about / The truth is out there
- newsgroups
- Nokia / BYOD, Mobiles
- Nokia Lumia / BYOD
- normal use warranty
- about / Basic terms
- Norton / Antivirus software on smartphones
- NRPC 1352
- about / Reverse proxy, VPN connection
O
- online chatting
- online communication
- about / Text messaging, chatting, and video chatting
- history / Text messaging, chatting, and video chatting
- e-mail / Text messaging, chatting, and video chatting
- message boards / Text messaging, chatting, and video chatting
- newsgroups / Text messaging, chatting, and video chatting
- online payments
- online shopping
- mobile decive, used for / Who has your data? The final stretch…
- operating system
- about / Jailbreak and rooting
- operating system developer
- contacting, for software error / Operating system or user interface
- OS management
- about / Access control
- OS operators
P
- Pandora
- about / The truth is out there
- Paper Toss. Studies
- about / The truth is out there
- partial wipe
- passfault
- URL / Longer and varied passwords
- about / Longer and varied passwords
- password
- modifying / Changing passwords
- password attacker
- about / Longer and varied passwords
- password cracker
- about / Longer and varied passwords
- password management
- password meter
- about / Longer and varied passwords
- URL / Longer and varied passwords
- password policies
- about / Management of data on the device
- passwords
- obtaining / Passwords that work
- payload
- about / iPhone configuration tools
- payment
- collecting, smartphones used for / Text messaging, chatting, and video chatting
- persistent cookies
- about / Cookies, cookies everywhere
- personal computers
- smartphones, comparing to / They are watching you…and they know your name
- Personal Computers (PC) / Does your company trust your device?
- personal customer support system
- about / Customer support by phone
- personal device
- Personal Identification Number (PIN) / Buying your device
- personal information
- stealing / They are watching you…and they know your name, What's in it for the information thieves?
- selling / What's in it for the information thieves?
- collecting, by Carrier IQ app / The fallout
- collecting, Carrier IQ app used / The truth is out there
- collecting / Who has your data? The final stretch…
- protecting / Steps you can take to protect yourself
- Personal QR Code
- about / CueCats and QR codes
- phishing
- about / Phishing
- phishing, types
- malware-based phishing / Types of phishing
- deceptive phishing / Types of phishing
- DNS-based phishing (pharming) / Types of phishing
- Content Injection phishing / Types of phishing
- data theft / Types of phishing
- search engine phishing / Types of phishing
- phreaking
- about / Toll fraud
- pod2g
- URL / SMS spoofing
- power user
- about / Power users
- tools / Power user tools
- predictive analytics
- premium-rate SMS malware
- about / Toll fraud
- premium service abuser
- about / Toll fraud
- privacy
- about / The mobile user's security
- privileged user access
- about / Cloud security
- product defects coverage
- about / Extended warranty coverage
- professional networking sites
- about / The Internet
- profile hacks
- about / Knowing the difference – device hacks, profile hacks, or both
- differentiating, with device hacks / Knowing the difference – device hacks, profile hacks, or both
- Pumpkin Maker
- about / The truth is out there
Q
- QR boxes
- reading / CueCats and QR codes
- usage / CueCats and QR codes
- QR code
- creating / CueCats and QR codes
- QR code generator
- URL / CueCats and QR codes
- QR reader app / CueCats and QR codes
- Quick Response Code (QR Code)
- about / CueCats and QR codes
R
- Real Time Operating Systems (RTOS) / Making a smartphone smart
- recommended applications
- Red Hat 6 / Licensing information for IBM Notes Traveler
- remote lock
- about / Management of data on the device
- restore, Apple device
- about / Apple backup
- restore, mobile device
- about / The Apple profile
- retailers
- customer location, tracking / Who has your data? Round 3…
- reverse proxy
- RIM Blackberry Devices / Types of devices in the environment
- rooting
- Rovio
- about / The truth is out there
S
- @ symbol / The Internet
- Safe Harbor Act / Cloud security
- SafeSearch
- Sale of Goods ACT / Basic terms
- Salt Lake City
- Samsung
- URL, for online assistant / The device type (BYOD or the corporate device)
- Samsung Galaxy S / Mobiles
- Samsung Galaxy S3 / BYOD
- screenloggers attack
- about / Types of phishing
- search engine
- about / The Internet
- search engine phishing
- about / Types of phishing
- security
- about / The mobile user's security
- security compliance
- about / Cloud security
- security policy
- about / Management of data on the device
- security settings
- creating / Establishing appropriate security settings
- security threats
- selective wipe
- about / Management of data on the device
- service providers
- session cookie
- about / Cookies, cookies everywhere
- sexting
- sexually explicit text message (sext)
- Short Message Service (SMS)
- short message service (SMS) / The truth is out there
- SIM
- used, for identifying mobile device / Identifying your phone – the numbers that set your device apart
- about / Identifying your phone – the numbers that set your device apart
- SIM card
- Simple tether configuration tool
- about / Simple tether configuration tool
- Skulls
- about / Virus/worms/others
- Skype / Text messaging, chatting, and video chatting
- SLA
- SlideShare / Cloud computing security
- SmartMan
- smartphone
- using / Troy and You
- preventative measures, for hacking / For any device
- smartphone activities
- smartphone revolution
- smartphones
- risks / The dangers of mobile computers
- hacking, malware used / Malware and viruses
- hacking, viruses used / Malware and viruses
- revolutionizing / The new mobile world
- features / Making a smartphone smart
- operating systems / Making a smartphone smart
- cloud computing, designing for data retrieval / The cloud
- personal computers, comparing to / They are watching you…and they know your name
- infecting, malware used / What's in it for the information thieves?
- reach out / Reach out and touch
- protecting, from hackers / Preventative measures – how to reduce the likelihood that your device will be hacked
- preventative measures, for hacking / Preventative measures – how to reduce the likelihood that your device will be hacked
- accessing, through SMS messaging attacks / SMS messaging attacks
- used, for conducting company business / The smartphone – a personal device, a company device, or both?
- hardware issue / Other device issues
- operating system error / Operating system or user interface
- warranties / Warranties in the mobile space
- maintaining / Summing it up
- replacing / Summing it up
- categories / Definitions
- used, for collecting payment / Text messaging, chatting, and video chatting
- SMS messaging attacks
- accessing / SMS messaging attacks
- smartphones, accessing through / SMS messaging attacks
- SMS spoofing
- about / SMS spoofing
- implementing / SMS spoofing
- impacts / SMS spoofing
- SMS text messaging
- about / SMS text
- social engineering
- about / Social engineering, Social engineering
- phishing / Social engineering
- spear phishing / Social engineering, Spear phishing
- social networking
- about / Social networking
- social networking site
- about / Social networking, Social networking
- Classmates.com / Social networking, Social networking
- Geocities / Social networking, Social networking
- history / Social networking, Social networking
- Facebook / Social networking, Social networking
- Friendster / Social networking, Social networking
- Twitter / Social networking
- Tripod / Social networking
- Myspace / Social networking
- LinkedIn / Social networking
- social networking sites
- tracking / Facebook and customer tracking
- software and applications coverage
- about / Extended warranty coverage
- software error
- operating system developer, contacting for / Operating system or user interface
- Sony / Mobiles
- spam
- about / The Internet
- spear phishing
- Sprint / Hidden "features"
- SpyEye
- about / Virus/worms/others
- stolen devices
- wiping / Stolen or lost devices
- strangers
- chatting, with children / Strangers and dangers
- strong password
- creating / Using strong passwords
- using / Using strong passwords
- technique / Longer and varied passwords
- SUSE 11 / Licensing information for IBM Notes Traveler
- Symantec Report / A prediction of the future (and the lottery numbers for next week) scams
- synchronization
- about / Access control
- system reconfiguration attacks
- about / Types of phishing
T
- T-Mobile / Hidden "features"
- technical support
- technical support, contacting
- technical support parties
- about / OS operators, manufacturers, and service providers
- OS operators / OS operators, manufacturers, and service providers
- manufacturer / OS operators, manufacturers, and service providers
- service providers / OS operators, manufacturers, and service providers
- technology
- influences, on young generation / Colliding generations
- Telegraph
- telephone
- about / Mobiles
- texting
- text messages
- TextPlus4
- about / The truth is out there
- threats, mobile device
- malware / Malware
- social engineering / Social engineering
- virus / Virus/worms/others
- toll fraud
- about / Toll fraud
- tools, power user
- about / Power user tools
- iPhone configuration / iPhone configuration tools
- Android configuration / Android configuration tools
- traveler servers
- about / Location of the mail servers
- configuration / Connection methodologies to the Traveler servers
- Trend Micro Mobile Backup and Restore
- URL / Android backup
- Tripod
- about / Social networking
- Trojan
- smartphones, accessing through SMS messaging attacks / SMS messaging attacks
- Twitter
- about / Social networking
- two-factor authentication / Steps you can take to protect yourself
U
- U.S. Department of Justice / They are watching you…and they know your name
- UCC
- about / Basic terms, Extended warranty considerations
- URL / Basic terms
- United States Department of Justice (US DoJ) / Who has your data? Round 2…
- United States Federal Bureau of Investigation (FBI) / Steps you can take to protect yourself
- updates and compliance
- URL (Uniform Resource Locator)
- about / The Internet
- users
- personal information, sharing on social networking site / The two-way street of social networking
V
- varied password
- creating / Longer and varied passwords
- VentureBeat
- example / Toll fraud
- verbal, extended warranty
- about / Types of extended warranties
- video chatting
- Virtual Private Network (VPN)
- about / iPhone configuration tools
- virus
- about / Virus/worms/others
- viruses
- used, for hacking smartphones / Malware and viruses
- VPN
- about / VPN connection
- using / Specific management of the device
- VPN connection
- IBM Notes Traveler Server, deploying to / VPN connection
- configuration / VPN connection
- VPN technology
W
- Wall Street Journal (WSJ)
- about / The truth is out there
- warranties, smartphones / Warranties in the mobile space, Warranties
- manufacturer warranty / Basic terms, Warranties
- lifetime warranty / Basic terms, Warranties
- normal use / Basic terms
- extended warranty / Basic terms, Warranties
- implied warranty / Basic terms
- As is / Basic terms
- cell phone insurance / Basic terms, Warranties
- utilization / Navigating the web of warranties
- standard warranty / Warranties
- insurance / Warranties
- weak password
- about / Longer and varied passwords
- Whatsapp / Text messaging, chatting, and video chatting
- Wi-Fi
- Windows 8
- about / Let's not forget Windows
- Windows Live ID
- about / Let's not forget Windows
- Windows Live PC
- about / Let's not forget Windows
- Windows Mobile
- about / Jailbreak and rooting
- Windows Phones / BYOD
- Windows RT
- Windows Server 12 / Licensing information for IBM Notes Traveler
- Windows Store
- about / Let's not forget Windows
- wireless internet
- about / The Internet
- workplace
- mobile devices, using at / Bring your mobile device to work day
- World Wide Web
- about / The Internet
- written statement considerations
- about / Extended warranty considerations
X
- XCode Organizer
- XML (Extensible Markup Language)
- about / iPhone configuration tools
Y
- Yahoo!
- about / The Internet
- young generation
- technology, influences / Colliding generations
- Youtube / The Internet
Z
- ZDNet
- Zeus
- about / Virus/worms/others
- ZitMo
- about / Virus/worms/others