OpManager: A single console to manage your complete IT infrastructure. Click here for a 30-day free trial.
Welcome Guest | Sign In
TechNewsWorld.com
Blackphone to Peddle a Few Good Apps
December 10, 2014
Blackphone plans to open an app store for privacy-focused applications to run on its secure smartphone. The store is expected to launch in January. The Blackphone runs PrivatOS, a modified version of Android 4.4.2 that comes bundled with tools that encrypt phone calls, texts, emails and Internet browsing. The app store will feature curated apps selected for their security and privacy chops.
NotCompatible Mobile Malware Gets Badder
November 21, 2014
A new version of the NotCompatible malware, which first appeared in 2012, is bigger, badder and pretty much indestructible, Lookout Security reported. And it can compromise corporate networks, thanks to the BYOD trend. The malware, called "NotCompatible C," focuses on Android devices. The NotCompatible Trojan is used to spread spam campaigns, among other nefarious activities.
Researchers Shine Spotlight on OS X/iOS Masque Attack
November 12, 2014
Researchers at FireEye on Monday made public the existence of the Masque Attack, which threatens iOS and Mac OS X operating systems. Masque Attack exploits a flaw in Apple's OSes that allows the replacement of one app by another so long as both apps use the same bundle identifier. All apps, except those preinstalled on iOS, such as Mobile Safari, can be replaced.
BYOD Privacy: Do Employees Have Rights?
October 02, 2014
Using personal devices to conduct business has become commonplace, whether employers require it or employees voluntary do so. The use of personal devices creates a privacy challenge. Employers want access to the devices, and employees want to protect their personal data contained on them. The term "devices" itself is deceiving. Many consider employee-owned devices to be smartphones and tablets.
BlackBerry's Chen Touts Passport's Square Deal
September 23, 2014
BlackBerry on Wednesday will hold official launch events for its much-anticipated and potentially game-changing Passport smartphone in Toronto, London and Dubai. The Passport's unique square-shaped form factor is designed with business and professional users in mind. In the run-up to these events, BlackBerry CEO John Chen announced that the Passport will be priced at $599 for an unlocked version.
The Dark Side of BYOD
September 09, 2014
The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 of them, or 37 percent, were cleaned of everything -- including personal data.
Carrier Software Flaws Imperil Smartphones: Report
August 08, 2014
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device management tool using the OMA Device Management Standard, which carriers embed into mobile devices.
The Big Honking Business-as-Usual IBM-Apple Deal
July 17, 2014
The news that Apple and IBM have joined forces sent a shockwave through the Apple-focused world this week, and I admit it, I was surprised. At first glance, the deal seems to be this big group hug with the two companies becoming inextricably entwined. Yeah, it's not that. In fact, this is the biggest deal that really isn't all that "BIG" that I've seen in a long time.
Your Abandoned Smartphone May Betray You
July 09, 2014
Doing a factory reset to wipe the data off smartphones does not work, and the data can be recovered, warned Avast. The company recovered tons of data, including more than 40,000 stored photographs, from 20 used Android phones purchased from eBay. Device owners need to overwrite their files to make them irretrievable, Avast said, touting one of the applications it offers.
Cupid Fires Arrow at OpenSSL's Heart
June 10, 2014
As if the discovery of the Heartbleed flaw weren't enough woe for OpenSSL, more than half a dozen additional defects have been discovered in the code used to protect communication on the Web. Among them is one dubbed "Cupid" by its discoverers. The flaw can be used to compromise enterprise networks. Like Heartbleed, Cupid uses a malicious heartbeat packet to compromise a TLS connection.
Salesforce1 Mobile App Drives Internet of Customers
May 27, 2014
Salesforce.com has announced that its Salesforce1 Mobile App will be generally available in the company's summer release. The app will be accompanied by an enterprise ecosystem consisting of some 65 partner apps, a new connector for SAP, and a slew of new features around sales, service and marketing functionality, said Michael Peachey, senior director of mobile products for Salesforce.com.
Security Firms Scour Mobile Apps
February 24, 2014
Security pros weren't very kind to mobile applications last week. A number of firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. While Android has been a poster child for misbehaving apps in the past, competitor Apple's apps aren't as pristine as is commonly believed.
Careless, Reckless Staff Are Corporate Security's Biggest Threat
February 07, 2014
We have met the enemy and he is us. Pogo's philosophical observation perfectly describes the way IT and security professionals view their end users' attitude toward data security. An overwhelming 80 percent of corporate security professionals and IT administrators indicated in a recent survey that "end user carelessness" constituted the biggest security threat to their organizations.
Smart Marketing in a BYOD World
January 21, 2014
Bring Your Own Device, or BYOD, is an established trend at many U.S. enterprises, and it's likely to continue to grow. Mobile marketing is an established channel through which many U.S. companies reach customers and prospective customers -- and it also is expected to grow. Is 2014 the year the twain will meet? Will marketers begin targeting consumers at work?
All Eyes May Be on Security in Samsung's S5
January 09, 2014
Rumors that Samsung will include iris-recognition technology in its forthcoming Galaxy S5 smartphone, widely expected to be launched in April, were given a boost on Thursday through an interview with Lee Young Hee, executive vice president of Samsung Mobile. People are "fanatical" about iris recognition technology and Samsung is "studying the possibility," Lee said.
Turning the BYOD Lemons Into Lemonade
January 06, 2014
The recent and rapid evolution of mobile and client management requirements has caused considerable complexity and confusion. Incomplete solutions and a lack of a clear pan-client strategy have hampered the move to broader mobile support at enterprises and mid-market companies alike. This state of muddled direction has put IT in a bind while frustrating users.
Jailbroken Phones Targeted by Hacker Jammers
December 16, 2013
Smartphones hacked to run unauthorized programs or unlock features are being targeted by hackers and can pose a threat to enterprise networks, warned Marble Security. Modifying a smartphone to enable unauthorized behavior -- called "rooting" in the Android world and "jailbreaking" in the iOS realm -- makes the mobile vulnerable to infected jammer software, the firm said.
AT&T Dials Down Pricing on No-Contract Plans
December 05, 2013
AT&T on Thursday announced new, lower-cost no-contract plans for customers who pay for their own devices. The new Mobile Share Value plans, which will be available beginning Dec. 8, will be open to new and existing wireless customers and will include a no-contract option that allows smartphone customers to save $15 per month by supplying their own device, AT&T said.
Dropbox Drops In on the Enterprise
November 14, 2013
Dropbox began courting enterprise users with Wednesday's unveiling of Dropbox for Business. It's a paid cloud storage service that offers enterprise users the same features that have made Dropbox a popular file-hosting company among consumers, along with several security and efficiency-focused features tailored for businesses, such as sharing audit logs and efficiently transferring files.
Boom Time for Corporate Cloud Marketplaces
November 11, 2013
The growing adoption of Bring Your Own Device policies by organizations of all sizes, across nearly every industry, has enabled corporate end-users and business units to more easily acquire apps tailored to their specific work requirements. This Bring Your Own Apps phenomenon, often referred to as the "consumerization of IT," has sparked a new round of debate among CIOs and other corporate executives.
Will Apple Throw the Enterprise a Bone?
October 21, 2013
Apple will likely debut a new iPad and possibly a new iPad mini at its Tuesday event in San Francisco. There is speculation about a new CPU, a keyboard case, better cameras, a splash of color, and the likelihood the new iPad will come preloaded with the buggy iOS 7. If the enterprise is looking for a little more business-friendliness from Apple, it may not find much gratification this time around.
Feds Hankering for Mobile IT Management Solutions
October 09, 2013
The acquisition process for the latest innovation must keep pace with the ever changing IT landscape. In the public sector, that process has surfaced in acquisition vehicles related to cloud technology, data management and IT security. For the U.S. government, the GSA has become a focal point for developing contract vehicles and programs to facilitate the acquisition of innovative IT.
Google Adds Remote Locking for MIA Androids
September 25, 2013
Google on Tuesday rolled out a feature for its recently launched Android Device Manager that lets users lock down a stolen Android device from anywhere, via the Web. "This is something that should be built into the OS and the platform because it's an inherent security feature," said tech analyst Rob Enderle. Google is late to the game in rolling out its remote lock capability.
BYOD Security Is All About Juggling Risks
September 23, 2013
Allowing workers to use personal phones and tablets to do their jobs has created security risks in the workplace, but those risks can be minimized if they're managed. What should such a risk management program do? "The first step is you have to protect the device," said IBM Application, Data and Mobile Security Director Caleb Barlow. That includes everything from provisioning to data wiping.

See More Articles in BYOD Section >>
Facebook Twitter LinkedIn Google+ RSS