Motorola's long-awaited Android phones are about to hit the market at last -- one will reportedly go to Verizon, the other to T-Mobile. None of the three companies will comment on the devices, but the blog Android and Me has posted what it says are tech specs on both devices.The Verizon device, called the "Sholes," will focus on gaming, according to the site, while the T-Mobile phone, called the "Morrison," will have GPS, a compass, email support and several other iPhone-like features.The phones are an indication that Motorola is trying to claw its way back into a market it once dominated.The Sholes will ship with Eclair (a next-generation update of the Andoid OS), and it will focus on gaming."Sholes is going to be the new flagship device for Android in 2009," wrote Taylor Wimberly on the blog.Google is cooking up four versions of Android this year, according to Andy Rubin, who heads Google's Android efforts. Android 1.6 is code-named "Donut," and Android 2.0 is code-named "Eclair." … [Read more...] about Are Android Phones Motorola’s Road to Redemption?
Mobile phone vector
As companies rush to offer mobile CRM apps to their customers, they are in danger of repeating the same mistake made a generation ago with the launch of early online initiatives: not placing enough emphasis on security. We know how that worked out. Untold millions of customers were compromised financially because the companies they chose to do business with online did not take proper precautions.The good news is that some companies remember this history and are taking pains to avoid repeating it as they roll out mobile CRM apps."Companies are learning that they have to treat mobile app development just as you would any kind of app development," Alan Goode, managing director of Goode Intelligence, told CRM Buyer.In the early days of mobile app development, many companies applied a less rigorous methodology for security, he said. Even a few years ago, the mobile phone was not widely recognized as a serious vector for hackers."Now we are seeing a bit of maturity on the part of … [Read more...] about Getting Your Mobile CRM Mojo Working
Antivirus experts have found a virus that can move from mobile phones to computers, but analysts say the bug is neither very dangerous nor very sophisticated.The Trojan, called CARDTRP.A or Sybos/Cardtrap.A by different antivirus vendors, is rated as a low risk by Trend Micro. F-Secure calls it "unremarkable" except that it runs on the mobile phone OS Symbian and will try to infect a PC if the phone's memory card is plugged into it."The only thing new that it does is ineffectively try to spread to the PC from the phone -- this is new behavior for phone malware but old hat for traditional malware. The IIS/sadmind worm, for example, spread to both Solaris and IIS," Ed Moyle, president, SecurityCurve, told TechNewsWorld. "So, it's not really new or innovative in itself -- it does, however, apply old concepts in a new way."Moyle said the Trojan was almost exactly like Cabir, another Symbian virus, and unlikely to do much harm."I don't think it's dangerous in and of itself, and I don't … [Read more...] about New Trojan Tries to Leap From Phone to PC
Trawling porn sites used to be the best way to pick up an electronically transmitted disease on your smartphone. That's not the case anymore.Every one in five times a mobile user is redirected to a malware site on the Internet, it's done through a malicious ad, according to a report released last week by Blue Coat. That's three times what it was two years ago.One reason malicious ads have been able to outperform porn sites is they can garner more traffic than the smut peddlers."We're seeing a shift in mobile user behavior," said Sasi Murthy, vice president of product marketing security at Blue Coat."We're seeing an increase in recreational usage for mobile users around shopping and entertainment," she told TechNewsWorld. "When we contrast that with the desktop world, recreational usage for mobile users is double.""Our friends in the cybercrime world are going to be focused on the same kinds of behaviors we are -- but for different purposes -- and set their strategies based on those … [Read more...] about SPOTLIGHT ON SECURITY Bad Ads Outstrip Porn as Mobile Phone Infection Vectors
The use of mobile devices provides significant benefits in convenience and workplace productivity. However, two recent reports indicate that, in the enthusiasm for using mobile technologies, U.S. government workers too often ignore security protocols associated with mobile IT.The Office of Personnel Management hack revealed earlier this year, which affected more than 20 million people, drove an immediate effort to address federal IT security. That effort largely has focused on IT systems and bypassed mobile device security."The cybersecurity practices, or lack thereof, of the federal government are under the microscope in the wake of the OPM hack. Yet hardly anyone is scrutinizing the unsanctioned use of mobile devices that could be putting government data at risk," said Bob Stevens, vice president of federal systems atLookout.Nearly 40 percent of federal employees are willing to sacrifice government security to use a personal mobile device at work, despite being aware of cybersecurity … [Read more...] about GOVERNMENT IT REPORT Surveys Reveal Lax Mobile Security Among Federal Workers