Thefts and robberies of mobile devices have become increasingly common and violent. How can you deter or mitigate them?
Several months ago, I wrote about the Four Ways SAP Is Embracing SoCloMo, i.e. the mashup of Social, Cloud and Mobile technology. Predictably, one of the ways involved our cloud HR acquisition, SuccessFactors. But there were three other excellent efforts that show just far SAP’s progressed beyond R/3. Today, I come to you with three more […]
TigerText doesn’t count down when your text messages will disappear, Mission Impossible-style. Nor, thankfully, does it blow up your smartphone. But in every other way, this 2-year-old app can make your text messages go Ghost Protocol nearly any way you want them to.
Smartphones are vaunted for their ease of use. But that’s precisely why they can be so vulnerable to hacking software, as Micro Systemation’s XRY showed last us last Wednesday.
Who says Android is the most insecure mobile OS around? Not the National Security Agency, which is conducting a pilot of 100 Motorola smartphones running the Android OS that it says are already good enough for its employees to make top-secret and classified phone calls from the field. “There are vulnerabilities in every OS,” said […]