Doug's Mailbag: Mobility Security
Here's a couple of readers' takes on mobile hacking issues:
I'm not worried for me or my business as I'd never allow dollar-vulnerable transactions over any wireless or mobile device. Period. Hard-wired transmissions are vulnerable enough at other points along path and storage.
I shiver to think of twenty- and thirty-somethings who show off to friends all they can do with their snazzy smartphones. They expose their assets by using smartphones for banking, stock, commodity transactions and, of course, credit card purchases. And 99.9 percent of those are completely safe and uneventful.
Hackers aren't really interested in our medical information -- an area in which we hear so much alarm.
But allowing financial passwords into the wrong hands is guaranteed to be life-changing.
OVERFLOW ATTACK? Have today's developers never heard of buffer capacity checking? Yes, Yes, I know, I'm one of those old fuddy duddys that wrote code in IBM Assembler 40 years ago. But you can rest assured that our logic, even though convoluted at times, did NOT experience the amount of OVERFLOW and/or MEMORY LEAKS that today's MODERN developers generate...
Share your thoughts with the editors of this newsletter! Write to firstname.lastname@example.org. Letters printed in this newsletter may be edited for length and clarity, and will be credited by first name only (we do NOT print last names or e-mail addresses).
Posted by Doug Barney on 01/28/2011 at 1:18 PM