What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. The odds are stacked against us. Mobile operators like Verizon and Sprint routinely scan for threats, and both Google Android and the Apple iPhone include multiple security measures on their devices, from fingerprint scanners to full encryption.

Yet, there’s a sneaking suspicion that mobile security is a bigger concern. According to one HP report, 67 percent of employees in the U.S. now work remotely. We’re relying on phones more and more. We store sensitive business documents on them and use them to make purchases.

To read this article in full or to leave a comment, please click here

Continue reading What this expensive ‘secure’ phone tells us about mobile hacking

Posted in Uncategorized

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. The odds are stacked against us. Mobile operators like Verizon and Sprint routinely scan for threats, and both Google Android and the Apple iPhone include multiple security measures on their devices, from fingerprint scanners to full encryption.

Yet, there’s a sneaking suspicion that mobile security is a bigger concern. According to one HP report, 67 percent of employees in the U.S. now work remotely. We’re relying on phones more and more. We store sensitive business documents on them and use them to make purchases.

To read this article in full or to leave a comment, please click here

Continue reading What this expensive ‘secure’ phone tells us about mobile hacking

Posted in Uncategorized

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Wait, what?

If this rumor about Verizon buying Yahoo for $5B is true, we have an honest to goodness schadenfreude moment for me as someone who remembers the days of the Buddy List, giant banner ads (which is actually still common at Yahoo Mail for some reason), and those plastic discs they might still sell at Walmart for gaining “high-speed Internet” access.

As you may know, Verizon also owns AOL. Those three letters, combined with the Yahoo exclamation mark, create some vivid memories. Few of them are good ones. I remember having to wait for my modem to connect to AOL back in the day, and for the banner ads at Yahoo.com to finish loading. It’s a curious development, but it makes about as much sense as other luminous icons of tech combining into an ungodly entity driven by brand dominance.

To read this article in full or to leave a comment, please click here

Continue reading Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Posted in Uncategorized

5 security experts share their best tips for ‘fringe’ devices

What is a ‘fringe’ device in IT?

For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day.

As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.

To read this article in full or to leave a comment, please click here

Continue reading 5 security experts share their best tips for ‘fringe’ devices

Posted in Uncategorized

5 security experts share their best tips for ‘fringe’ devices

What is a ‘fringe’ device in IT?

For some, it’s a gadget everyone has forgotten about — a printer in a corner office, an Android tablet in a public area used to schedule conference rooms. A fringe device can also be one that’s common enough to be used in the office yet not so common that everyone is carrying one around or has one hooked up to the Wi-Fi every day.

As with any security concern, many of these devices are overlooked. There might be security policies and software used to track and monitor iPads and Dell laptops, but what about the old HP printer used at the receptionist’s desk? In a hospital, it might be a patient monitoring device. In a more technical shop, it could be a new smartphone running an alternate operating system.

To read this article in full or to leave a comment, please click here

Continue reading 5 security experts share their best tips for ‘fringe’ devices

Posted in Uncategorized