Can Charging a Cell Phone Take Down an IT System?

*********************************
There is now a CONTENT FREEZE for Mercury while we switch to a new platform. It began on Friday, March 10 at 6pm and will end on Wednesday, March 15 at noon. No new content can be created during this time, but all material in the system as of the beginning of the freeze will be migrated to the new platform, including users and groups. Functionally the new site is identical to the old one. webteam@gatech.edu
*********************************

External News Details

Cyber attacks on mobile phones have mostly targeted personal information, but that's likley to change. In the 2012 Emerging Cyber Threats Report, Georgia Tech information security experts predict mobile phones increasingly will be a vector to attack networks and critical systems. Source: GovInfoSecurity.com

Additional Information

Groups

College of Computing, School of Computer Science

Categories
No categories were selected.
Keywords
cyber security, Emerging Cyber Threats Report, Georgia Tech Information Security Center, information security, mobile devices, Mustaque Ahamad, School of Computer Science
Status
  • Created By: Mike Terrazas
  • Workflow Status: Published
  • Created On: Oct 14, 2011 - 7:44am
  • Last Updated: Oct 7, 2016 - 10:25pm