Tag Archives: mobile devices
I was in an Office Depot the other day. There was one person in line at the checkout counter and another customer approaching the line. Then a sales clerk intercepted the person heading toward the line and said, “I can help you right here, sir.” The clerk had a mobile device in her hands. She swiped the customer’s credit card, … Read more
The proliferation of mobile devices is opening new opportunities for security vendors, but innovative approaches to the market are needed, Gartner Inc says in a new report. Ruggero Contu, research director at Gartner, says one of the challenges facing vendors is that consumer adoption and willingness to pay for antivirus software on mobile devices is low.
Michael Cooney of Network World published a semi-silly article about malware affecting smart toilets that run the Android operating system. (See Just when you thought it was safe to go to the bathroom – toilet malware strikes.) The article reports that TrustWave SpiderLads issued a security bulletin to warn users of the software-controlled toilet that miscreants could take command of … Read more
The wireless control systems used at many major infrastructure facilities have vulnerabilities which could allow a hacker with a radio frequency (RF) transceiver to close down a plant from up to 40 miles away; two security researchers told the Black Hat convention in Las Vegas. Lucas Apa and Carlos Mario Penagos Hollman of IOActive said in a presentation that they … Read more
There’s an article in the New York Times about how retail stores are increasingly using technology to track customers’ movements and interests when they are physically in the stores. (Check out the article’s video to see some of this technology in action.) Stores use Wi-Fi signals from customers’ mobile phones to track where an individual goes within the store and … Read more
Whether or not your organization allows employees to use their personally owned devices to access corporate resources, you need to have a written policy that covers the acceptable use of mobile devices. This policy should clearly communicate to all employees what is, and is not, acceptable use of their smartphones, tablets and other mobile devices as it pertains to access … Read more
Researchers at the University of Alabama at Birmingham say they have developed and tested malware that can be triggered on a smartphone using light, sound, magnetic fields or vibration – posing a critical new cyber-security threat.
Even security pros practice poor security “hygiene,” with some 83 percent saying they use the same password across multiple mobile applications, according to a new survey. This figure, and others, comes by way of Ping Identity’s ‘Impact of Mobile’ Survey, which surveyed 198 attendees at this year’s RSA Conference. The survey sought to discover how work habits are changing as … Read more
That Really Cool App You Put on Your Smart Phone is Probably Collecting All Sorts of Information – and You Don’t Even Know It
A few weeks ago I warned that mobile applications may not behave the way that users expect them to. (See “App Happy Downloaders May Get More Than They Expect.”) As a follow-up to that post, I talked more in-depth with Domingo Guerra, president and co-founder of Appthority. Guerra’s company has analyzed hundreds of thousands of mobile apps to discover what … Read more
While there is little doubt that mobility options provide a great deal of flexibility when it comes to where and when work related tasks can be accomplished, and provide for more efficient means of employee collaboration and access, does it really have an impact on productivity? According to a newly published study, federal government employees who utilize mobile devices in … Read more