After an exhaustive and protracted testing phase, the U.S. Department of Defense finally awarded security clearance to Apple’s iPhone and iPad on Friday.
In particular, the Defense Information Systems Agency confirmed the approval of the Apple iOS 6 Security Technical Implementation Guide (STIG).
Approval of the STIG means that government-issued iOS 6 mobile devices are approved for use when connecting to DOD networks within current mobility pilots or the future mobile device management framework.
Posted in Android, Announcements, BlackBerry, iOS, Mobile Devices, Mobile Security, News, Platforms, Resources, Smartphones, Technology
According to a somewhat alarming new report from MacWorld, an iOS app available in Apple’s App Store was found to contain an embedded Trojan horse.
The app, we’re told, isn’t dangerous and should pose no threat.
The bad news, however, is that this potential malware threat found its way past Apple’s review process in the first place.
Posted in Android, Announcements, Apple App Store, iOS, Mobile Apps, Mobile Security, News, Platforms, Resources
The folks at domain registrar Register.com have published a new entry into their popular blog series, the latest of which delves into how small business owners, partially through shrewd marketing, can earn the trust of mobile and online shoppers.
“It’s been called the one universal truth in all of eCommerce: if you can’t earn a shopper’s trust, you certainly won’t earn their business,” the post reads. “It’s no secret that establishing an online business is a vastly time consuming and expensive process. But regardless of how many resources you pour into your enterprise, all will be for naught if consumer trust isn’t secured.”
So what can marketers focus on to help shore up trust among online and mobile shoppers?
Posted in Announcements, Marketing Strategy, Mobile Advertising, Mobile Commerce, Mobile Devices, Mobile Marketing, Mobile Security, News, Platforms, Resources
Every day in America, millions of consumers fill up their cups of coffee while getting their fill of free WiFi at America’s top coffee shops.
But is that really a safe move given the rise in identity theft and cyber crimes?
Recently, the team at ThreatMetrix – makers of well known and respect cybercrime prevention solutions – published a new infographic that puts the potential dangers of coffee shop WiFi access into focus.
Posted in Announcements, Infographics, Mobile Devices, Mobile Networks, Mobile Security, News, Platforms, Privacy, Resources, Technology, Wi-Fi
Following this week’s embarrassing hack attack on AP’s Twitter account, security analysts are calling for Twitter to get serious on user accounts that serve exceptionally serious purposes.
On Tuesday, AP’s twitter account erroneously tweeted that an explosion occurred at the White House, injuring the President of the United States. The false tweet sent the Dow Jones Industrial Average plummeting and sparked panic and scattering in newsrooms across the world.
In response to these all-too-common hack jobs in social media, Twitter is now believed to be working on a “two-step security solution” that is “undergoing internal testing” before launching publicly, Daily Deal Media reported Wednesday after knowledgeable sources confirmed the plans to Wired.
Posted in Announcements, Mobile Security, Mobile Social, News, Platforms, Predictions, Privacy, Resources, Rumors, Technology
When it comes to mobile malware, Android is a magnet of epic proportions. More examples of this unfortunate reality surfaced this week.
Android malware deceptively disguised as a mobile ad network is on the loose and infecting millions of mobile devices.
According to Lookout Mobile Security, the new threat is called BadNews, a recent entry into the malware family. So far, it’s been found in 32 apps across four different developer accounts in Google Play.
Posted in Android, Announcements, Mobile Apps, Mobile Devices, Mobile Security, Mobile Spam, News, Platforms, Privacy, Resources, Smartphones, Technology
Security solutions giant NQ Mobile reports that malware attacks on smartphones powered by Android grew exponentially last year.
Monday’s report underscores the recent wave of concern regarding the vulnerability of Google’s mobile operating system to such attacks.
In 2012, the Android OS continued to be the number one target for mobile malware. Overall, the number of malware attacks more than doubled from 2011 to 2012.
Posted in Android, Announcements, Mobile Devices, Mobile Security, News, Platforms, Resources, Technology