Computerworld - T-Mobile USA Inc. said it has fixed problems that allowed hackers to probe a limited number of customers connected to its General Packet Radio Service (GPRS) network, according to company spokeswoman Kim Thompson.
Bellevue, Wash.-based T-Mobile has installed a firewall on the segment of its network that had allowed hackers to probe GPRS IP connections that are used by what Thompson described as "less than 100 users" (see story).
Mike Palmer, the Washington-based technology director for the broadcast division of The Associated Press in New York, had detected more than 25 hacker probes in the past month against a laptop PC used to send video and text files over the T-Mobile GPRS network.
Palmer said he checked his inbound IP traffic on Tuesday and was no longer getting unsolicited inbound traffic.
Under the billing format used by T-Mobile, a subsidiary of Deutsche Telekom AG in Bonn, Germany, and other U.S.-based cellular carriers, users of mobile data service pay by the megabyte, meaning Palmer would have to pay for the hacker attacks if his total traffic passed a certain level each month.
Read more about Mobile/Wireless in Computerworld's Mobile/Wireless Topic Center.
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise Endpoint Backup Checklist Read this checklist to learn how to create a back up strategy to quickly and easily protect your endpoint data.
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts