Fresh off its full plate of announcements at Mobile World Congress in Barcelona, Spain last month, Samsung continues to make post-MWC waves, this time with the company’s latest efforts in the realm of mobile security.
Samsung Electronics recently touted the launch of KNOX 2.0, the evolution of KNOX, the company’s end-to-end secure mobile platform solution designed to provide “advanced data and privacy protection for enterprise users.”
The new features, we’re told, better support IT departments looking for reassurance and convenience as they implement and manage their Bring Your Own Device strategies.
Posted in Android, Announcements, Mobile Devices, Mobile Security, News, Platforms, Predictions, Resources, Smartphones, Technology, Topics
On Tuesday, Apple released an update (OS X 10.9.2) to its Mavericks operating system. After the recently uncovered SSL security issue was uncovered and ultimately addressed last week for iOS devices through the release of iOS 7.0.6, Apple has now tackled the problem on Mavericks.
It’s now believed that would-be attackers would no longer be able to easily intercept secure connection data on a local network.
Beyond this critically important security fix, Apple also tossed in a few new features to Tuesday’s update, including the ability for Mac users to make and accept FaceTime audio calls. Apple also enabled user blocking on iMessage.
Posted in Announcements, iOS, Mobile Security, News, Resources
A purported vulnerability within the Snapchat mobile app is making some users very apprehensive today.
According to the Los Angeles Times, a cyber security researcher says the vulnerability in question enables hackers to launch a denial-of-service attack aimed at iPhones.
When successful, such efforts temporarily freeze the device.
Posted in Announcements, Mobile Apps, Mobile Devices, Mobile Security, News, Platforms, Technology
On Wednesday, MMW was privy to an advanced look a new report from Mobiquity that was published this morning.
The mobile engagement provider says it has determined that significant enterprise functionality lapses still exist in current deployments of beacon programs.
This gap – in monitoring, authentication and authorization – could significantly impact the touted benefits of this new technology aimed at retailers and other early adopters. The findings are a result of the “Micro-Locationing Project” from Mobiquity Labs a newly launched applied technology lab that explores the feasibility of technology and aims to help Mobiquity clients design mobile solution prototypes that integrate emerging technology.
Posted in Announcements, Mobile Devices, Mobile Security, News, Platforms, Technology
For those who fear they are being watched on mobile, here’s another scary fact to consider. According to a revelation from a British spy agency GCHQ, thinking that your sent and received text messages are immune to surveillance is foolhardy.
“The National Security Agency (NSA) has the ability of collecting SMS text messages and related data in bulk from around the world,” a BGR report published Friday reads.
Posted in Mobile Security, Platforms, Smartphones, SMS / Text
Controversy erupted overnight following scant reports earlier on Tuesday that Apple’s database had been breached.
As Apple Insider initially reported, hacker group 1775 Sec’s Twitter page presented a startling revelation yesterday. The group claimed to have effectively hacked Apple’s database.
AppleInsider has verified that some user information is legitimate, but the veracity of other data, such as passwords, email addresses and user names, is questionable. For example, many phone numbers are no longer in service, suggesting the data is old. Another scenario is that the information is not, in fact, from Apple’s database and the posts are simply a hoax to garner media attention.
Posted in iOS, Mobile Security, News, Platforms, Rumors
As of last month, Gmail provided an update to all users ensuring that all images sent into a Gmail inbox would be automatically displayed in the email. While most users will not notice a real change in the way their emails display or the way they are received, there are some significant changes behind the scenes that have occurred. First of all, this allows Google to immediately cache the images in the email. This means that it can more easily scan and look for malware in the image.
In addition, Google has instituted a new policy, wherein, after opening a marketing email, that user’s IP address and device information are not relayed back to the marketer. This will make it more difficult for marketers to track consumers who use Gmail.
Posted in Mobile Security, News, Platforms, Resources, Technology