Attention Marketers: Access 30 Million IT Decision Makers with ECT News Network's INSTA-LEADS ∑ Click to Learn More!
Welcome Guest | Sign In
TechNewsWorld.com
BYOD Privacy: Do Employees Have Rights?
October 02, 2014
Using personal devices to conduct business has become commonplace, whether employers require it or employees voluntary do so. The use of personal devices creates a privacy challenge. Employers want access to the devices, and employees want to protect their personal data contained on them. The term "devices" itself is deceiving. Many consider employee-owned devices to be smartphones and tablets.
BlackBerry's Chen Touts Passport's Square Deal
September 23, 2014
BlackBerry on Wednesday will hold official launch events for its much-anticipated and potentially game-changing Passport smartphone in Toronto, London and Dubai. The Passport's unique square-shaped form factor is designed with business and professional users in mind. In the run-up to these events, BlackBerry CEO John Chen announced that the Passport will be priced at $599 for an unlocked version.
The Dark Side of BYOD
September 09, 2014
The BYOD trend offers pluses for both employers and employees, but sometimes there's a hitch. Under certain circumstances, the owner of a device suddenly might lose all of the data stored on it. Clients of Fiberlink remotely wiped 81,000 mobile devices between January and June. About 30,000 of them, or 37 percent, were cleaned of everything -- including personal data.
Carrier Software Flaws Imperil Smartphones: Report
August 08, 2014
Wireless carriers pose a threat to mobile phone security, researchers have disclosed. Mathew Solnik and Marc Blanchou of Accuvant this week told an audience at the Black Hat security conference in Las Vegas that Android, BlackBerry and some iOS devices are vulnerable. The problem lies in a device management tool using the OMA Device Management Standard, which carriers embed into mobile devices.
The Big Honking Business-as-Usual IBM-Apple Deal
July 17, 2014
The news that Apple and IBM have joined forces sent a shockwave through the Apple-focused world this week, and I admit it, I was surprised. At first glance, the deal seems to be this big group hug with the two companies becoming inextricably entwined. Yeah, it's not that. In fact, this is the biggest deal that really isn't all that "BIG" that I've seen in a long time.
Your Abandoned Smartphone May Betray You
July 09, 2014
Doing a factory reset to wipe the data off smartphones does not work, and the data can be recovered, warned Avast. The company recovered tons of data, including more than 40,000 stored photographs, from 20 used Android phones purchased from eBay. Device owners need to overwrite their files to make them irretrievable, Avast said, touting one of the applications it offers.
Cupid Fires Arrow at OpenSSL's Heart
June 10, 2014
As if the discovery of the Heartbleed flaw weren't enough woe for OpenSSL, more than half a dozen additional defects have been discovered in the code used to protect communication on the Web. Among them is one dubbed "Cupid" by its discoverers. The flaw can be used to compromise enterprise networks. Like Heartbleed, Cupid uses a malicious heartbeat packet to compromise a TLS connection.
Salesforce1 Mobile App Drives Internet of Customers
May 27, 2014
Salesforce.com has announced that its Salesforce1 Mobile App will be generally available in the company's summer release. The app will be accompanied by an enterprise ecosystem consisting of some 65 partner apps, a new connector for SAP, and a slew of new features around sales, service and marketing functionality, said Michael Peachey, senior director of mobile products for Salesforce.com.
Security Firms Scour Mobile Apps
February 24, 2014
Security pros weren't very kind to mobile applications last week. A number of firms knocked apps produced for the smartphone market for all kinds of risky behaviors that could lead to trouble not only for mobile device owners, but also for their employers. While Android has been a poster child for misbehaving apps in the past, competitor Apple's apps aren't as pristine as is commonly believed.
Careless, Reckless Staff Are Corporate Security's Biggest Threat
February 07, 2014
We have met the enemy and he is us. Pogo's philosophical observation perfectly describes the way IT and security professionals view their end users' attitude toward data security. An overwhelming 80 percent of corporate security professionals and IT administrators indicated in a recent survey that "end user carelessness" constituted the biggest security threat to their organizations.
Smart Marketing in a BYOD World
January 21, 2014
Bring Your Own Device, or BYOD, is an established trend at many U.S. enterprises, and it's likely to continue to grow. Mobile marketing is an established channel through which many U.S. companies reach customers and prospective customers -- and it also is expected to grow. Is 2014 the year the twain will meet? Will marketers begin targeting consumers at work?
All Eyes May Be on Security in Samsung's S5
January 09, 2014
Rumors that Samsung will include iris-recognition technology in its forthcoming Galaxy S5 smartphone, widely expected to be launched in April, were given a boost on Thursday through an interview with Lee Young Hee, executive vice president of Samsung Mobile. People are "fanatical" about iris recognition technology and Samsung is "studying the possibility," Lee said.
Turning the BYOD Lemons Into Lemonade
January 06, 2014
The recent and rapid evolution of mobile and client management requirements has caused considerable complexity and confusion. Incomplete solutions and a lack of a clear pan-client strategy have hampered the move to broader mobile support at enterprises and mid-market companies alike. This state of muddled direction has put IT in a bind while frustrating users.
Jailbroken Phones Targeted by Hacker Jammers
December 16, 2013
Smartphones hacked to run unauthorized programs or unlock features are being targeted by hackers and can pose a threat to enterprise networks, warned Marble Security. Modifying a smartphone to enable unauthorized behavior -- called "rooting" in the Android world and "jailbreaking" in the iOS realm -- makes the mobile vulnerable to infected jammer software, the firm said.
AT&T Dials Down Pricing on No-Contract Plans
December 05, 2013
AT&T on Thursday announced new, lower-cost no-contract plans for customers who pay for their own devices. The new Mobile Share Value plans, which will be available beginning Dec. 8, will be open to new and existing wireless customers and will include a no-contract option that allows smartphone customers to save $15 per month by supplying their own device, AT&T said.
Dropbox Drops In on the Enterprise
November 14, 2013
Dropbox began courting enterprise users with Wednesday's unveiling of Dropbox for Business. It's a paid cloud storage service that offers enterprise users the same features that have made Dropbox a popular file-hosting company among consumers, along with several security and efficiency-focused features tailored for businesses, such as sharing audit logs and efficiently transferring files.
Boom Time for Corporate Cloud Marketplaces
November 11, 2013
The growing adoption of Bring Your Own Device policies by organizations of all sizes, across nearly every industry, has enabled corporate end-users and business units to more easily acquire apps tailored to their specific work requirements. This Bring Your Own Apps phenomenon, often referred to as the "consumerization of IT," has sparked a new round of debate among CIOs and other corporate executives.
Will Apple Throw the Enterprise a Bone?
October 21, 2013
Apple will likely debut a new iPad and possibly a new iPad mini at its Tuesday event in San Francisco. There is speculation about a new CPU, a keyboard case, better cameras, a splash of color, and the likelihood the new iPad will come preloaded with the buggy iOS 7. If the enterprise is looking for a little more business-friendliness from Apple, it may not find much gratification this time around.
Feds Hankering for Mobile IT Management Solutions
October 09, 2013
The acquisition process for the latest innovation must keep pace with the ever changing IT landscape. In the public sector, that process has surfaced in acquisition vehicles related to cloud technology, data management and IT security. For the U.S. government, the GSA has become a focal point for developing contract vehicles and programs to facilitate the acquisition of innovative IT.
Google Adds Remote Locking for MIA Androids
September 25, 2013
Google on Tuesday rolled out a feature for its recently launched Android Device Manager that lets users lock down a stolen Android device from anywhere, via the Web. "This is something that should be built into the OS and the platform because it's an inherent security feature," said tech analyst Rob Enderle. Google is late to the game in rolling out its remote lock capability.
BYOD Security Is All About Juggling Risks
September 23, 2013
Allowing workers to use personal phones and tablets to do their jobs has created security risks in the workplace, but those risks can be minimized if they're managed. What should such a risk management program do? "The first step is you have to protect the device," said IBM Application, Data and Mobile Security Director Caleb Barlow. That includes everything from provisioning to data wiping.
Cracking the BYOD Security Nut
September 23, 2013
While so-called BYOD isn't necessarily new -- IT departments, after all, have been supporting mobile road warriors since the 1980s -- the rising tide of end users seeking the use and support of their own consumer devices is different. It's so different that IT departments are grasping for any standard or proven approaches that make BYOD access of enterprise resources both secure and reliable.
Samsung Enlists Lookout for Android Enterprise Security
September 05, 2013
Samsung will bundle a forthcoming business suite from Lookout into its flailing Knox enterprise security solution for the Android platform. Knox, an end-to-end solution that provides security from the hardware all the way through to the application level, is Samsung's approach to the security threats posed by BYOD. The announcement is drawing mixed responses from security professionals.
No End to the Headaches Endpoints Give System Defenders
September 03, 2013
If there's one attack surface that's attracting growing attention from digital marauders, it's a system's endpoints. With the proliferation of BYOD, securing connections can be a defender's nightmare. Endpoints have an allure for attackers because they offer multiple attack vectors, such as social engineering attacks, spearphishing, USB infection, and compromise of WiFi networks and routers.

See More Articles in BYOD Section >>
Facebook Twitter LinkedIn Google+ RSS