SUBSCRIBE
SUBSCRIBE
EXPLORE +
  • About infoDOCKET
  • Academic Libraries on LJ
  • Research on LJ
  • News on LJ
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Libraries
    • Academic Libraries
    • Government Libraries
    • National Libraries
    • Public Libraries
  • Companies (Publishers/Vendors)
    • EBSCO
    • Elsevier
    • Ex Libris
    • Frontiers
    • Gale
    • PLOS
    • Scholastic
  • New Resources
    • Dashboards
    • Data Files
    • Digital Collections
    • Digital Preservation
    • Interactive Tools
    • Maps
    • Other
    • Podcasts
    • Productivity
  • New Research
    • Conference Presentations
    • Journal Articles
    • Lecture
    • New Issue
    • Reports
  • Topics
    • Archives & Special Collections
    • Associations & Organizations
    • Awards
    • Funding
    • Interviews
    • Jobs
    • Management & Leadership
    • News
    • Patrons & Users
    • Preservation
    • Profiles
    • Publishing
    • Roundup
    • Scholarly Communications
      • Open Access

November 7, 2012 by Gary Price

Report Lists Top Threats to Mobile Computing

November 7, 2012 by Gary Price

Here’s a recently released report from the Cloud Security Alliance, an organization whose members include ACM, AT&T, Amazon Web Services, Google, HP, IBM, Microsoft, RSA, University of Nebraska, and many others.
The report includes some facts and findings that will be of interest to both those who handle Internet access as well issues mobile device users should be aware of.

Top Mobile Threats is a result of a survey of more than 200 enterprise participants representing 26 countries globally.
Rank of Top Mobile Threats

  1. Data loss from lost, stolen or decommissioned devices
  2. Information-stealing mobile malware
  3.  Data loss and data leakage through poorly written third-party applications
  4.  Vulnerabilities within devices, OS, design and third-party applications. Insecure Wifi network or rogue access points
  5.  Insecure WiFi, network access and rogue access points.
  6. Insecure or rogue marketplaces
  7.  Insufficient management tools, capabilities and access to APIs (includes personas).
  8. NFC and proximity-based hacking.

The results in the Top Threats to Mobile Computing report, which focused on those threats posed by smartphones and tablets, are intended to aid information security professionals and educate the industry about security concerns. In addition to identifying top threats, respondents also indicated a couple of additional concerns with 64 percent of respondents believing that NFC and proximity-based hacking will happen in 2013. Also 81 percent of respondents believe that insecure WiFi and rogue access points are already happening today. This is of particular concern as the proliferation of mobile devices consequently increases the use of and reliance on WiFi networks.

Direct to Full Text Report: Top Threats to Mobile Computing (via Cloud Security Alliance)

Filed under: Data Files, Management and Leadership, News, Patrons and Users

SHARE:

About Gary Price

Gary Price (gprice@gmail.com) is a librarian, writer, consultant, and frequent conference speaker based in the Washington D.C. metro area. He earned his MLIS degree from Wayne State University in Detroit. Price has won several awards including the SLA Innovations in Technology Award and Alumnus of the Year from the Wayne St. University Library and Information Science Program. From 2006-2009 he was Director of Online Information Services at Ask.com.

ADVERTISEMENT

Archives

Job Zone

ADVERTISEMENT

Related Infodocket Posts

ADVERTISEMENT

FOLLOW US ON X

Tweets by infoDOCKET

ADVERTISEMENT

This coverage is free for all visitors. Your support makes this possible.

This coverage is free for all visitors. Your support makes this possible.

Primary Sidebar

  • News
  • Reviews+
  • Technology
  • Programs+
  • Design
  • Leadership
  • People
  • COVID-19
  • Advocacy
  • Opinion
  • INFOdocket
  • Job Zone

Reviews+

  • Booklists
  • Prepub Alert
  • Book Pulse
  • Media
  • Readers' Advisory
  • Self-Published Books
  • Review Submissions
  • Review for LJ

Awards

  • Library of the Year
  • Librarian of the Year
  • Movers & Shakers 2022
  • Paralibrarian of the Year
  • Best Small Library
  • Marketer of the Year
  • All Awards Guidelines
  • Community Impact Prize

Resources

  • LJ Index/Star Libraries
  • Research
  • White Papers / Case Studies

Events & PD

  • Online Courses
  • In-Person Events
  • Virtual Events
  • Webcasts
  • About Us
  • Contact Us
  • Advertise
  • Subscribe
  • Media Inquiries
  • Newsletter Sign Up
  • Submit Features/News
  • Data Privacy
  • Terms of Use
  • Terms of Sale
  • FAQs
  • Careers at MSI


© 2026 Library Journal. All rights reserved.


© 2022 Library Journal. All rights reserved.