Is the smartwatch market dead? | Tech Talk Ep 1, Pt 1
Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.
Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.
The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?
Credit to Author: Evan Schuman| Date: Tue, 05 Sep 2017 14:13:00 -0700
IT is seeing a very dangerous collision of two trends: BYOD and mobile apps. IT’s job is, among other things, to protect corporate data, a portion of the company’s intellectual property. And yet easily downloaded consumer apps are threatening that data security by sharing their sensitive data with mobile apps that have almost infinite capabilities.
Consider this reference from a scary story courtesy of The Intercept: “When launched for the first time, [popular app Sarahah] immediately harvests and uploads all phone numbers and email addresses in your address book. Although Sarahah does in some cases ask for permission to access contacts, it does not disclose that it uploads such data, nor does it seem to make any functional use of the information.”
To read this article in full or to leave a comment, please click here
Credit to Author: Lucas Mearian| Date: Tue, 05 Sep 2017 21:04:00 -0700
Enterprise mobility management (EMM) software vendor MobileIron today announced its Apple release, aimed at the growing need for enterprises to provide IT managers with more robust management and security features for Macs.
While Windows and even Chrome-based laptops are already included in EMM consoles, macOS hardware has traditionally been treated as an outlier in the office, according to Nick McGuire, vice president of Enterprise Research at CCS Insight.
While MobileIron’s software suite already supported macOS for basic functions, including device configuration, millennials entering the workforce favor Apple’s line of laptops – driving the need for a unified endpoint management strategy that includes security and bulk licensing, according to Ojas Rege, MobileIron’s chief strategy officer.
To read this article in full or to leave a comment, please click here
Credit to Author: John Brandon| Date: Thu, 31 Aug 2017 13:52:00 -0700
The term “improperly configured” is a real plague on the IT landscape.
It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.
Essential phone recently sent an email to customers asking for proof of identity. This request was a little odd in the first place — who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.
To read this article in full or to leave a comment, please click here
Credit to Author: John Brandon| Date: Thu, 31 Aug 2017 13:52:00 -0700
The term “improperly configured” is a real plague on the IT landscape.
It can refer to a firewall protecting an enterprise; it can create problems on a web server. For one newly minted smartphone company, it can also look pretty embarrassing.
Essential phone recently sent out an email to customers asking for proof of identity. This request was a little odd in the first place–who does that anymore? The email basically asked customers to send a picture of a photo identification or passport by email. From a security standpoint, that’s a bit like asking people to text your credit card number to a hacker.
To read this article in full or to leave a comment, please click here
Credit to Author: JR Raphael| Date: Tue, 29 Aug 2017 10:01:00 -0700
When you read about a splashy new software update like Google’s fresh-from-the-oven Android 8.0 Oreo release, you tend to hear mostly about the marquee features — the most attention-grabbing elements and refinements you’re likely to notice when you get the update on your own device.
It’s understandable, since those are the things we all see most immediately and directly. Beneath the surface, though, Oreo has some pretty significant stuff going on in the realm of security — stuff that hasn’t been widely covered but is as important as anything else to understand.
To read this article in full or to leave a comment, please click here
Credit to Author: Nathan Collier| Date: Mon, 28 Aug 2017 17:00:21 +0000
Along with the recent release of Google’s new OS Android 8.0 Oreo, they also released a new security suite known as Google Play Protect. Categories: Tags: AndroidGooglemalware scannermobile malwareplay protect |
The post Mobile Menace Monday: Implications of Google Play Protect appeared first on Malwarebytes Labs.
Read more