Jim Clausing, AT&T Principal Member, Technical Staff
Jim Clausing has over 30 years of experience in computing, 15 years of which is in network security. His specialties include: Packet analysis Malware analysis Incident response and forensics Network...
View Article5 Ways Hackers Get to Your Mobile Device
Every malicious attack method used to attack PCs is now being rewritten to hack mobile devices. How are the hackers getting to your mobile phone? 5 Popular Ways: Malware Once used primarily to gain...
View ArticleMobile Security…Off the Device and Into The Cloud
In a recent post, 5 Ways Hackers Get Your Mobile Device, I told you that every malicious attack method used on PCs is being re-written by the hacking community to attack mobile devices. It makes sense,...
View ArticleTop Seven Tips for Improving Mobile Device Security
When I started out in this industry, one of the first things I learned about was Moore’s Law. Gordon Moore, co-founder of Intel, famously predicted in a 1965 paper that the number of components in...
View ArticleIPv6, Relearning Old Lessons, and How Will You Know?
Those of us that have been in the business for a while know that there have been reports of the imminent exhaustion of IPv4 addresses for more than a decade. Finally, earlier this year, IANA (the...
View Article8 Thoughts on Passwords and Password Management
In light of the recent disclosures (within 24 hours of each other) of the stealing of passwords (or password hashes) from LinkedIn, last.fm, and eHarmony, I thought I’d share a few thoughts and tips on...
View Article
More Pages to Explore .....