In a recent post we discussed the notion that installing mobile apps, even those for the corporate use, shouldn’t need a user manual. The user experience to install and use the app should be intuitive.
The concept that endpoints are tangible objects, things like smartphones and tablets, has become an outdated point of view.
With the rapidfire proliferation of apps and device-to-device connections, the traditional infrastructure we understand as endpoints are not equipped to secure the new endpoints. That’s because the unit of protection has shifted from devices to “mobile apps, data, and connections to other devices.”Read More
Malware is everywhere this week, as displayed from our featured articles. From mobile banking apps, to Bible and Quran apps, no application, regardless of its type, is exempt from malware or hacks.
Hackers are blending old and new methods to find innovative ways to steal personal information from you. Are you protected from these efforts?Read More
Remember that time you read the manual for Candy Crush or Angry Birds? No, well those are games and shouldn’t require documentation. But what about Uber, Facebook, OpenTable, or Yelp? No, of course not!
That’s because great mobile apps are intuitive. People expect to know what to do with a mobile app without reading anything (manuals for cars, maybe, but apps? No way!). We have all been conditioned to gravitate to apps that are easy to grok and abandon those that aren’t.
The proliferation of connected devices and ghost security means continued flawed security for mobile.
It is projected that 50 million smart devices are going to be sold over the holiday season alone!
Where are these smart devices going to be bought? Why, from smartphones, of course!Read More
App and tech security breaches have run amuck this week. Hackers are tapping into more and more diversified outlets in order to steal users' information. One in particular, was using an APK installation under the guise of a Microsoft Word document.
Before installing anything on your phone (even if it's on an app), be wary of its origin.Read More
To summarize many of these articles, there is a "lack of priority in mobile security." (see first article below)
As mobile devices become more integrated into our daily lives, it is essential we address the problems that lack of proper security poses to our personal and professional lives.
Both Apple and Android well as many apps that run on those platforms have proven security risks and flaws.Read More