Nine Steps You Can Take To Help Prevent ‘Apple Picking’ [iPhone, iPad Robberies] »

Thefts and robberies of mobile devices have become increasingly common and violent. How can you deter or mitigate them?

Three Wildly Different Ways SAP Is Bring Mobile And Cloud Together »

Several months ago, I wrote about the Four Ways SAP Is Embracing SoCloMo, i.e. the mashup of Social, Cloud and Mobile technology. Predictably, one of the ways involved our cloud HR acquisition, SuccessFactors. But there were three other excellent efforts that show just far SAP’s progressed beyond R/3. Today, I come to you with three more […]

App for Cheating Spouses Is Actually Extremely Useful for Enterprise BYOD »

TigerText doesn’t count down when your text messages will disappear, Mission Impossible-style. Nor, thankfully, does it blow up your smartphone. But in every other way, this 2-year-old app can make your text messages go Ghost Protocol nearly any way you want them to.

Three Ways to Thwart XRY’s 2-Minute iPhone Passcode Hack »

Smartphones are vaunted for their ease of use. But that’s precisely why they can be so vulnerable to hacking software, as Micro Systemation’s XRY showed last us last Wednesday.

NSA Testing Motorola Android Smartphones for Top-Secret Calls »

Who says Android is the most insecure mobile OS around? Not the National Security Agency, which is conducting a pilot of 100 Motorola smartphones running the Android OS that it says are already good enough for its employees to make top-secret and classified phone calls from the field. “There are vulnerabilities in every OS,” said […]