Quantcast
Channel: AT&T Networking Exchange Blog » Jim Clausing
Browsing all 6 articles
Browse latest View live

Jim Clausing, AT&T Principal Member, Technical Staff

Jim Clausing has over 30 years of experience in computing, 15 years of which is in network security. His specialties include: Packet  analysis Malware analysis Incident response and forensics Network...

View Article



Image may be NSFW.
Clik here to view.

5 Ways Hackers Get to Your Mobile Device

Every malicious attack method used to attack PCs is now being rewritten to hack mobile devices. How are the hackers getting to your mobile phone? 5 Popular Ways: Malware Once used primarily to gain...

View Article

Image may be NSFW.
Clik here to view.

Mobile Security…Off the Device and Into The Cloud

In a recent post, 5 Ways Hackers Get Your Mobile Device, I told you that every malicious attack method used on PCs is being re-written by the hacking community to attack mobile devices. It makes sense,...

View Article

Image may be NSFW.
Clik here to view.

Top Seven Tips for Improving Mobile Device Security

When I started out in this industry, one of the first things I learned about was Moore’s Law. Gordon Moore, co-founder of Intel, famously predicted in a 1965 paper that the number of components in...

View Article

Image may be NSFW.
Clik here to view.

IPv6, Relearning Old Lessons, and How Will You Know?

Those of us that have been in the business for a while know that there have been reports of the imminent exhaustion of IPv4 addresses for more than a decade.  Finally, earlier this year, IANA (the...

View Article


Image may be NSFW.
Clik here to view.

8 Thoughts on Passwords and Password Management

In light of the recent disclosures (within 24 hours of each other) of the stealing of passwords (or password hashes) from LinkedIn, last.fm, and eHarmony, I thought I’d share a few thoughts and tips on...

View Article
Browsing all 6 articles
Browse latest View live




Latest Images