It’s often said that the great thing about standards in the technology industry is that there are so many to choose from. That's just as true in today's world of mobile devices as it was in the days of mainframes when it was first coined.
Mozilla, LG, Qualcomm, Deutsche Telekom and a number of other leading mobile companies have taken a step closer to a world where standards are... well, standard, by joining forces to create the Open Web Device Compliance Review Board (CRB). The aim of the CRB is to support device manufacturers and their technology partners to standardize performance.
A new report by information research specialist NSS Labs focuses on the evolving landscape of mobile financial malware. It concludes that cyber criminals are adapting to the use of mobile apps to authorize transactions and that 99 percent of current mobile malware is aimed at the Android platform.
As banks add extra functionality to their apps they open up greater capabilities for both customers and the cyber criminals. Many mobile banking apps are based on HTML code making them especially vulnerable to exploits. The report's author, NSS Labs Research Vice President Ken Baylor, says this should prompt more banks to develop secure native apps for mobiles, incorporating fraud-resistant features, if their customers are to stay secure.
Everyone is familiar with Google Docs but the Sheets spreadsheet application always seems to have been a bit of a poor relation in terms of the search giant's cloud office portfolio. Now though there's a new release which brings more speed, more features and -- for the first time -- an offline mode.
The new version supports more cells so you can create bigger, more complex, worksheets. New features include Filter Views which let you save and share sections of the data, useful for collaborative projects.
You might think that dialer malware went out with dial-up modems and that in these days of broadband you don't need to worry about viruses that call premium rate numbers in order to earn criminals money.
But researchers at mobile security specialist Lookout have uncovered a new piece of malware called Mouabad.p that tries to make money by making calls from your Android smartphone. Of course smartphone fraud involving premium SMS messages isn't new but making calls represents a step up in the malware's functionality.
California-based SaaS security specialist Adallom has revealed the existence of an Office 365 token flaw in Office 2013 that could allow malicious web servers to intercept authentication tokens and remotely access a SharePoint site without any alerts being raised.
Writing on the company's blog Noam Liran, Adallom's chief software architect describes the attack as an "ice dagger" because it's the perfect weapon, leaving no trace. He says, "The vulnerability we've found and the security incident that used it have all the makings of a great crime mystery. Only through months of diligent research were we and the Microsoft Security Response Team able to piece together the elements of what might otherwise have been a perfect crime, totally invisible to existing perimeter and endpoint protection defenses".
The demands of mobile use in the workplace create extra challenges when it comes to ensuring information is shared effectively. This is a particular issue when it involves working on documents. Help is at hand though as content collaboration specialist Huddle has unveiled a new cloud tool enabling users to quickly and easily create document content in the cloud, share it with teams and collaborate on it with colleagues.
Huddle Note offers an alternative to legacy applications in order to speed up the document handling process. Once a note is created it can be shared with a single click and other users can review and offer feedback. All comments are time-stamped so it's easy to see the full history of a document. There’s full version control too so that you can track all previous versions and revert to an earlier one if required. Because it uses the existing Huddle platform your notes are protected by enterprise-grade security.
Business intelligence solutions, although they provide a wealth of information, traditionally rely on analytical techniques that take a good deal of time and effort to produce meaningful output. Birst has been a leader in cloud-based BI for a while and is now launching a visual discovery facility to streamline access.
Birst Visualizer sits on top of the existing Birst product's logical layer to provide accurate, business-aware enterprise data. It aims to combine a Google-like search with Amazon-style recommendations, allowing decision makers self-service access to data that might previously have needed specialist reporting skills.
Miami-based startup Textter has developed a new service aiming to revolutionize the way people send and receive text messages.
We spoke to company founder Carlos Cueto in an exclusive interview ahead of next week's official launch to find out more about the product and what it has to offer.
One of the most useful things about the internet is its ability to bring people together to trade and exchange. Think eBay, Play and Amazon Marketplace. But all of these are aimed at people with physical products to sell. London-based Hirejungle has come up with a platform that lets businesses and individuals hire out their goods or services.
Peer-to-peer rental, or the sharing economy, is big business according to The Economist. Whether you want to hire a car, rent a room for the night or find someone to carry out a home improvement job, technology makes it much easier to find what you need.
Given all of the current buzz surrounding mobile you'd think that businesses would be falling over themselves to embrace the technology. But a new survey of IT decision makers by enterprise application and security expert Mobile Helix shows that whilst 78 percent of enterprises have a mobile strategy, 86 percent are not using it to transform their business.
The survey of 300 CIOs in the UK and US reveals that 87 percent think that their employees would benefit from mobile access to enterprise applications. However, many of them are reluctant to invest. Complexity is cited by 66 percent as a reason not to pursue a mobile strategy, with 72 percent saying it's too costly to integrate mobile innovations into legacy applications. Development, security and support concerns are also listed as limiting factors.
Last month we reported on research showing that 65 percent of financial professionals were putting company data at risk by using unauthorized apps. New research carried out for anti-virus company McAfee shows that the figure is even higher across the enterprise as whole.
The study finds that of 600 employees surveyed across North America, the UK and Australasia, 80 percent admit to using non-approved software as a service (SaaS) applications in their jobs. These applications are referred to as "Shadow IT", meaning technology that hasn’t been approved by the IT department or acquired according to company procurement policy.
Most businesses by now will have heard of the Google Cloud Platform which lets developers run applications on Google's servers. The company today announces general availability of its Google Compute Engine offering scalable, secure virtual machines running Linux.
In its preview phase Compute Engine supported only Debian and Centos running with a customized Google kernel. It now supports any out of the box Linux distro so that developers can work with a familiar environment but also support software that needs a specific kernel or file system.
Increased use of mobile devices by consumers means that companies face challenges in terms of making their services and data available on a range of different gadgets. To give customers a properly interactive experience you need more than just a website. The key to doing this is APIs (Application Programming Interfaces) which allow connections to be established between your data and your customer's devices.
But developing APIs can be a complex and costly process. In order to streamline this StrikeIron has announced the public launch of its new hosted API management tool in the form of IronCloud.
According to a new survey by broadcaster PBS KIDS more than half of parents (54 percent) plan on buying technology gifts for their offspring this Christmas. That figure rises to 59 percent for younger, more tech savvy parents.
Top of the shopping list are tablets, featuring in 28 percent of parental intentions, with games consoles on only 18 percent. Combine tablet and smartphone purchasing intentions and 36 percent of parents will be buying.