Mobile Security

Thu
23
Mar

Smart Phone Security

Smart Phone Security

A study of smartphone users by Internet and Mobile Association of India and Times Internet Limited states that the number of mobile internet users in India had reached 371 million by June 2016, and is on track to cross 500 million users by 2017. Mobile handset security has three prominent aspects: Hardware, Software and User.

Mon
18
Jan

Dictation - that may put you in jeopardy

Dictation - that may put you in jeopardy

Most of us are aware of the use of the applications that offers voice dictation feature. If we talk to the IOS or Android application that has the dictation feature, it will convert your voice/words to text. This will help us to create larger documents without awkwardly typing out the words on the on-display keyboard. We can talk to the application while driving. My friend who writes stories used to tell me that, all good imaginations or ideas come to him while driving. So he uses an application to talk while driving and the application converts his voice to text and later he posts those in his blog. One time when he was travelling towards a hill station, my friend had a tough time, even though good sceneries had given him lot of threads for writing stories, but he was not able type those because mobile network/internet coverage was not available over there for the voice dictation software he was using.  :-)

Sat
22
Aug

Mobile Security Challenge Part III

Mobile Security Challenge Part III

Mobile Security Challenge Part III

HTML 5! HTML5 is a core technology markup language of the Internet used for structuring and presenting content for the World Wide Web. A recent research had suggested that this feature can be used by websites to find out how much battery life a visitor has left on their laptop or smartphone which could in turn help them track online users.  This is a clear violation of privacy. The online user’s privacy can be compromised since some websites have the capability of knowing exactly how much of the battery is left and until what time can the user survive on this batter power on his/her mobile. Combining the two numbers i.e., the battery capacity consumed & remaining through the internet, the attacker can know 1. The type of browser the person is using & 2. Location of the user.

Sun
26
Jul

Mobile Security Challenge Part II

Mobile Security Challenge Part II

Mobile Security Challenge Part II: Digital World

As the new devices enter the market of Digital World, the imposing strict security does face much greater challenge. In coming times the enterprise data not just resides on smartphones and tablets, but also on Internet of Things (IoT) like on cars, on smart TVs, on smart watches and other wearable devices.

In this new Digital workplace adventures has brought-in the enterprise mobility and security moving in the opposite direction. The employees are increasingly using more than 1 end-point to carry-out their work and accustomed to working across multiple devices, to transferring files between devices, and to fast and fluid switching between their personal and professional worlds. Hence the traditional security measures are fast becoming obsolete.

Sat
18
Jul

Mobile Security Challenge

Mobile Security Challenge
  1. The rise of BYOD: The BYOD was just the beginning in the Mobile arena, the IT professionals and the people concerned with Mobile security have to come to the terms of BYOD. With the moving time the problems/issues concerned with the same has also moved blurring the lines between business and personal activity. Taking the use and popularity of the BYOD, effective management of mobile risk will increasingly require a user-centric approach.
  2. Prediction: It was said that the BYOD would take over the whole world of Mobile, appears to have a limited success till today. Taking the present scenario the company premises still predominate in the business environment by a convincing margin. Agreed on the comments of the people that the use of personal equipment is on the up but it is misleading to focus on this alone since the growth is approximately off a larger base.

Pages

Subscribe to RSS - Mobile Security