• This week, AT&T’s 3G network servicing the Apple iPad was breached. AT&T claims the breach is closed, but RESCUECOM CEO David A. Milman says, “While most everyone is aware that security is important, very few of us understand what goes into securing the software, hardware, and networks that contain our most valuable asset, our identity. AT&T’s breach is a perfect example of how at risk we are.”

    RESCUECOM provides iPad users with five tips to protect their personal data:

    1. Turn off the 3G Network: AT&T has stated that there is no more threat to customers. However, turning off 3G wireless Internet service, at least temporarily, will protect an individual’s personal data from any further attack.

    2. Request a new SIM from AT&T: The ICC-ID number that the hackers breached is attached to each user’s SIM, the card linking an individual iPad to its user. Changing the SIM card would change the ICC-ID as well, rendering that information useless.

    3. Confirm any email from Apple or AT&T: The most likely threat to iPad users comes from what are called “phishing attacks” – fraudulent e-mails disguised as being from a trusted source. These attacks trick users into giving away personal information or into opening e-mails that may install malicious programs.

    In this case, the e-mails would most likely seem to come from Apple or AT&T, as most users would expect. Should an iPad owner get an email, they should confirm that it came from the real Apple or AT&T, and remember that the real companies never ask for personal or login information in an e-mail.

    4. Change your email: The simplest solution is to stop using the compromised e-mail address. AT&T states the only information illicitly obtained was user’s e-mail addresses. Changing your address would eliminate this threat.

    5. Be careful what you use the iPad for: Using the iPad is, most likely, still safe. However, to best protect personal data, users should be careful what they use the iPad for. Avoid tasks such as mobile banking or anything that transmits personal information, especially when on a 3G network.

    For those consumers who have not yet purchased an iPad, but were considering it, Milman reminds them that, “As with all new technology, RESCUECOM recommends waiting at least six months for the manufacturer to work the major bugs out of the system.”

    RESCUECOM recognizes the value of personal and Internet security. Should any iPad owner feel that their personal data may have been compromised, they can contact one of our computer repair specialists for assistance.

    About RESCUECOM:

    RESCUECOM provides computer repair and computer support, 24/7: meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, and computer repair, visit http://www.rescuecom.com.


  • M.A.D. Partners, a global leader in securing smart phones and mobile devices, announces the immediate availability of Mobile Active Defense, the first 100% cloud-based and comprehensive mobile security solution
    for the enterprise. Mobile Active Defense forces all iPhone, iPad and iTouch traffic through the device VPN to the industry’s first Mobile Enterprise Compliance and Security (MECS) Server — a fully managed firewall that can either be hosted or managed.

    Using zero footprint technology, Mobile Active Defense offers IT and IS professionals exactly what they’ve been waiting for; comprehensive mobile security that also allows for complete compliancy. According to M.A.D. Partners’ CTO, Rob Smith, “M.A.D. protects just about everything the CISO and CTO would want. Email security, anti-virus, spam and malware detection and removal, encryption, VPN, a granular policy driven firewall, inventory control, provisioning and of course, extensive reporting.”

    M.A.D. Enterprise does not require any changes to existing security or IT infrastructure and can be up and running within hours. Moreover, Android, Symbian and Windows Mobile support will be available in coming weeks, all managed through a single console interface and managed firewall.

    As Larry Whiteside Jr., CISO of the Visiting Nurse Service of New York puts it, “We have had the types of controls needed for security and compliance with BlackBerry for years. It is critical that we demand the same level of security be used to mitigate against the risk inherent in iPhones, iPads and other mobile devices now that they are appearing in the enterprise.”

    With the success and security that was delivered with the BlackBerry and the BlackBerry Enterprise Server (BES), many information security and technology professionals looked beyond mobile security and switched their focus to more pressing concerns. However, with the rapid success and consumerization of a myriad of intelligent mobile technologies including the iPhone, iPad, Android phones, Nokia Symbian and Windows Mobile devices, the lack of available security and compliance for the mobile enterprise marks the availability of Mobile Active Defense at a critical and opportune time for companies in all sectors.

    Prior to Mobile Active Defense, and due to limited options, organizations have been piloting, or worse yet deploying these devices, using only the available controls from Microsoft ActiveSync and the iPhone native operating system. Multiple vendors unfortunately claim that managing these anemic features is “security.” With less than 50% of the controls offered by Mobile Active Defense — security and technology professionals have nervously been trying to figure out how to get back to the standard which they are
    used to with solutions like BES. Now with Mobile Active Defense, they have their answer.

    Tags: ,

« Previous Entries   Next Entries »

Recent Comments

  • That's sad because more people will lose jobs.
  • You're right. Mobile broadcast is the wave of the future. ...
  • I just love Dylan (and Cole too!!).Im a greaaaaatttttt fan o...
  • i try to get ringtones i hard to get free ringtones please h...
  • There is also iTag.com to track your gps phone