Can Charging a Cell Phone Take Down an IT System?

Contact
No contact information submitted.
Sidebar Content
No sidebar content submitted.
Summaries

Summary Sentence:

No summary sentence submitted.

Full Summary:

Cyber attacks on mobile phones have mostly targeted personal information, but that's likley to change. In the 2012 Emerging Cyber Threats Report, Georgia Tech information security experts predict mobile phones increasingly will be a vector to attack networks and critical systems. Source: GovInfoSecurity.com

Related Links

Additional Information

Groups

College of Computing

Categories
No categories were selected.
Related Core Research Areas
No core research areas were selected.
Newsroom Topics
No newsroom topics were selected.
Keywords
cyber security, Emerging Cyber Threats Report, Georgia Tech Information Security Center, information security, mobile devices, Mustaque Ahamad, School of Computer Science
Status
  • Created By: Mike Terrazas
  • Workflow Status: Draft
  • Created On: Oct 14, 2011 - 7:05am
  • Last Updated: Oct 7, 2016 - 11:10pm