Back to Results
First PageMeta Content
Smartphones / Videotelephony / Mobile telecommunications / Wireless / Electronic commerce / Windows Mobile / IMSI-catcher / Mobile phone / GSM / Technology / Electronic engineering / Mobile technology


Document Date: 2011-04-10 18:06:52


Open Document

File Size: 477,81 KB

Share Result on Facebook

Company

Limited Device Resources / the Washington Post / Danger Inc. / Joint Test Action Group / Siemens / Other Back End Systems / Gartner / Nokia / T-Mobile / C ENTRIC S ECURITY A SPECTS Software / H. Back End Systems / /

Country

United States / /

Currency

USD / /

Facility

Felix C. Freiling University of Mannheim / iTunes App Store / Christopher Wolf Horst G¨ortz Institute / University Bochum / /

IndustryTerm

3G infrastructure / mobile phone networks / malicious devices / web applications / main command-andcontrol infrastructure / mobile malicious software / thirdparty software / mobile web browser / database systems / extensible operating systems / on mobile devices / Internet services / voice services / vulnerable devices / possible security solutions / web browser / wireless link / Web accessibility / telephone network / infected mobile device / software updates / mobile operating systems / above protocol / removal tool / wireless interface / rogue base station using open source software / device resource processing power / real-life applications / software-centric attacks / Wireless Application Protocol / term mobile device / cryptographic algorithms / internal systems / web application attacks / mobile devices / mobile device operating systems / web server / malicious web server / mobile networking standards / insecure back end systems / wireless communication / security solutions / back end systems / payment devices / weak encryption algorithm / wireless connection / online payment services / security solution / charged premium services / payment systems / derivation algorithm / transmission protocols / Internet society / smartphone-based payment systems / malicious software / stolen devices / remote controlled mobile devices / increased processing power / web providers / attack vector web browser / mobile network operator / remote device management / computer security solutions / intrusion detection algorithms / media data / software stacks / network operator / stateless protocols / cloud computing / wireless pairing process / 4G mobile networks / encryption algorithm / security algorithms / device manufacturer / /

OperatingSystem

Symbian OS / Microsoft Windows / Windows Mobile / Symbian / Linux / Android / DoS / /

Organization

Felix C. Freiling University of Mannheim / Christopher Wolf Horst G¨ortz Institute / Multimedia Messaging Service / General Packet Radio Service / /

Person

Joe Sixpack / Michael Becher / Johannes Hoffmann / Thorsten Holz / Android / /

Position

malware author / IMSI Catcher / movie player / Radio Network Controller / /

Product

Motorola Sidekick Cellular Phone / iPhone / Apple iPhone 3GS Smartphone / /

PublishedMedium

the Washington Post / /

RadioStation

Radio Network Controller / /

Technology

RAM / corresponding protocol / above protocol / encryption algorithm / Linux / block cipher / mobile phones / operating system / also cryptographic algorithms / transmission protocols / Mobile Devices / encryption / Cryptography / WAP / key derivation algorithm / weak algorithm / A3 algorithm / security algorithms / GSM / A5 algorithms / 3G / Bluetooth / cable modem / broadband / SMS / smart phones / mobile phone system / smartphone / GPS / Android / mobile device / UDP / operating systems / DSL / intrusion detection algorithms / weak encryption algorithm / circuit-switched / cellular telephone / ISDN / WLAN / frequency hopping / smartphones / A8 algorithm / HTTP / paging / web server / Integrated Circuit / /

SocialTag