Tag Archive for RIMM

How Does Your Equipment Stack Up?

Cell phoneEngadget points us to phone-size.com that lets you compare the relative proportions of different smartphones. At the top of the webpage, you’ll also find a toolbar to enter the size and aspect ratio of your display. Once you jump through this minor hoop, according to Engadget, the utility produces accurate, life-size depictions of smartphones like Apple’s (AAPL) iPhonesGoogle’s (GOOG) Androids and Research In Motion’s (RIMM) Blackberrys.

rb-

Really wanted to use the title

Better Mobile Security

Better Mobile SecurityMobile device users should be concerned about security. This is especially true if the mobile device is used for work and it is configured with your employer’s email or messaging server. IT staffs can take steps to protect the date on the mobile. Eric Geier, the founder of NoWiresSecurity writes provided CIO Update with 6 tips for better mobile device security.

EncryptionTip No. 1 – Choose a mobile OS that supports encryption and use it: Mr. Greer says make sure the mobile operating system (OS) and device supports hardware-based encryption. The article says Apple’s (AAPL) iOS and Research In Motion’s (RIMM) BlackBerry support encryption for both internal and external storage. Without encryption it’s possible that someone could recover the data on the device even without your lock PIN or password.

Full device encryption is limited and varies on current Android device manufactures. Mr. Greer writes that Motorola Mobility’s (MMI) business-oriented smartphones offers encryption capabilities on Android 2.3. Android 3.x includes an API to help developers offer encryption on tablets. Android 4.x tablets and smartphones should support encryption sometime in 2012. WhisperCore is a third-party encryption solution which is in beta for Nexus S and Nexus One.

PasswordsTip No. 2 – Set a lock pin or password: The article says that enabling a password, whether it’s called a PIN, passcode, or passphrase, is the first line of defense in maintaining privacy and security. It helps prevent others from picking up your phone or device and snooping around if it becomes lost, stolen, or just left unattended. It’s also usually required if encryption is enabled on the device writes the author. A PIN will protect data and privacy from the causal snoopers.

Tip No. 3 – Enable auto-wiping of data: Most mobile OSes support automatic wiping of the device’s data after a certain number of incorrect passwords attempts. Mr. Greer says auto-wiping is natively supported by iOS, Windows Phone 7, and BlackBerry. Android requires a third-party app, such as Autowipe.

It is important to keep all your data regularly backed up so the data can be restored to a new mobile after it is wiped.

Mobile device managementTip No. 4 – Setup remote tracking and management: Before your phone or device gets misplaced or stolen the blog recommends that a remote tracking and management system should be set up. Most let you see the device’s GPS location on a map, send audible alerts to help you find it, and display a visual message to tell others how to return it. They typically also let you remotely lock and/or wipe it before someone else gets their hands on it. According to Mr. Greer:

  • For iOS 4.2 or later, Apple provides a free service.
  • For earlier iOS versions there’s the MobileMe service from Apple at $99 a year after the 60 day free trial.
  • For Android you have to use a third-party apps.
  • For Windows Phone 7 Microsoft provides the free Windows Live for Mobile service.
  • For BlackBerry, RIM provides the free BlackBerry Protect service.

Wireless Wi-Fi hotspotTip No. 5 – Limit Wi-Fi hotspot usage: When you use public Wi-Fi hotspots that aren’t encrypted, all your Internet traffic is transmitted through the air and can be easily intercepted. The most important sites and services, such as banking websites, usually implement their own (HTTPS/SSL) encryption that protects their individual traffic. But most email providers and many social networking sites don’t; thus eavesdroppers can likely capture their passwords and traffic.

On the other hand most 3G, 4G, and other cellular data connections are usually encrypted by the carriers. Plus eavesdropping on these types of connections isn’t as popular. Therefore, when you’re out and about you should try to use the data connection rather unsecured Wi-Fi hotspots.

If you insist on using Wi-Fi hotspots, use those that offer enterprise encryption and 802.1X authentication, such as from T-Mobile and iBahn. Alternatively, consider using a VPN connection to secure your traffic from local eavesdroppers.

Mobille malwareTip No. 6 – Use an antivirus or security app: Viruses, malware, and hacking on mobile devices is a growing problem. The author recommends installing a security app to help prevent infections and intrusions. Most AV solutions also offer other features, such as remote wiping, backup and locating.

 

Tablet Security Tips

Portable computingICSA Labs suggests a series of security tips for users of smartphones, tablets and apps Help Net Security reports.

App store1. Only buy apps from recognized app stores. Apps from unofficial third-party stores and applications downloaded from peer-to-peer sites are much more likely to contain malware than apps sanctioned by official vendor stores such as the Android App Market or Apple App Store.

2. Think twice about accepting “permissions.” Most applications, legitimate as well as malicious ones, need users to accept several “permissions” before the apps are installed. Check carefully to be sure that the app comes from a legitimate source. I wrote about mobile phones leaking data previously.

Inspect bills3. Monitor bills for irregular charges. If attackers gain access to personal information stored on the mobile device, they can quickly rack up charges by sending “silent” text messages to high-priced call services. For example, if the Google (GOOG) Android Trojan GGTracker is inadvertently installed on a device, it can sign up users, without their knowledge, for premium text messaging services.

4. Employ security policies to protect employer-issued devices. Employers should enforce password-based access and require voice mail codes so that only authorized users can get access to data on employer-issued devices.

Bring your own device5. Be mindful that more and more employees bring their personal devices to work. Companies must have security systems and policies in place to safeguard their business environment and prevent access to company networks from employees’ personal devices. I wrote about BYOT here

6. Remember that mobile devices are tiny handheld PCs. Many security threats that apply to traditional computers also apply to mobile devices, such as smartphones and tablets, and consumers should take necessary measures to protect themselves. One way to do this is to install anti-malware software on mobile devices and enable VPN functionality.

7. Protect your mobile phone password and voicemail PIN. If your mobile phone does not have a password, add one that is at least six digits. Try to choose a unique password that is not already used across other systems and accounts. Do not use repeating digits in passwords or voice mail pins. Remember that your provider will never request your voice mail pin, so do not be tempted to give it to anyone who requests it.

25 Tech Firms Sued for Breaching 3G Patents

patent trollTechEye points out a case started by Golden Bridge Technology (GBT) which lists 25 tech firms alleged to breach a number of 3G patents.  In the case Golden Bridge Technology (1:11-cv-00165-SLR, U.S. District Court District of Delaware)  GBT alleges the companies have breached patents 6,574,267 B1, and 7,359,427 on standards for 3G wireless communications including devices and base stations. The defendants, the filing says, have refused to license the patents.

GBT said its developments were adopted by 3GPP “as an important and necessary part of the 3G and UMTS standards.” GBT is seeking damages from the defendants’ alleged past and present infringement. All of the defendants, in one way or another, use GBT’s technology, it alleges. GBT is seeking damages from the defendants’ alleged past and present infringement.

The defendants in the case are:

  1. Amazon (AMZN),
  2. Acer,
  3. Barnes & Noble (BKS),
  4. Deutsche Telekom,
  5. Dell (DELL),
  6. Exedea,
  7. Garmin (GRMN),
  8. Hewlett Packard (HPQ),
  9. HTC,
  10. Huawei,
  11. Lenovo (LNVGY)
  12. LG Electronics,
  13. Novatel (NVTL),
  14. Option NV (OPTI),
  15. Palm,
  16. Panasonic (PC),
  17. Pantech,
  18. Research in Motion (RIMM),
  19. Sharp (SHCAY),
  20. Sierra Wireless (SWIR),
  21. Sony (SNE),
  22. Sony Ericsson,
  23. T-Mobile,
  24. UTStarcom (USTI)  and
  25. ZTE (783).

In addition, it wants treble damages against T-Mobile, HTC, LG, Palm, RIM and Sony Ericsson, and lawyers’ costs.

rb-

Like I have pointed out again and again and again, many firm’s business plan has de-evolved into patent trolling.

Does GBT deserve to collect a tax from every innovator?

IDC Predicts MSFT Smartphone Comeback

The prognosticators at research firm International Data Corporation (IDC) have looked into their crystal-ball and predicted that by 2015 Microsoft (MSFT) will take second place to Google’s (GOOG) Android in the smartphone market. TechEye points out in their indubitable way:

For that to happen, Apple followers will have to suddenly have a realisation that Jobs’ Mob’s walled garden of delights is not all it’s cracked up to be and would have to defect to the arch-enema of the Apple cargo cult – Steve Ballmer.

IDCIDC claims that in 2015, Windows 7 will pass Apple (AAPL) iOS as the alternative operating system to Android. Android will have about half the market and what is left will be divided between Research In Motion’s (RIMM) Blackberry and Apple.

Diner Attendee
Role
Firm
Total individual political contributions since 2008
Total 2010 firm lobbying
Tax holiday supporter
Carol Bartz
President and CEO
Yahoo Inc.$5,000$2.2 million
John Chambers
Chairman and CEO Cisco Systems Inc.
$17,200$2 millionYes
Dick Costolo CEO
Twitter Inc.
John DoerrPartnerKleiner Perkins Caufield & Byers
$3,000$200,000
Larry EllisonCo-Founder and CEO

Oracle Corp.$50,000$4.9 millionYes
Reed Hastings
CEO Netflix Inc.
$44,800$130,000
John Hennessy

PresidentStanford University$4,800$370,000
Steve JobsChairman and CEO Apple Inc.
$1.6 millionYes
Art Levinson
Chairman and former CEOGenentech Inc.
$250$443,500
Marissa MayerVP
Google $5.2 million
Eric SchmidtChairman and CEO
Google Inc.$72,300$5.2 million
Steve Westly
Managing Partner and FounderThe Westly Group$99,000
Mark ZuckerbergFounder and CEOFacebook Inc.$500$351,000

Steve Ballmer Microsoft MSFTThe latest stats show how far Ballmer’s Boys have to go to meet IDG‘s projections. MSFT has 5.5 percent of the market, apparently IDG believes that all the Symbian market will blindly follow Nokia to MSFT because the firms made a billion dollar deal. Sometimes it is also about functionality, copy and paste, multitouch.

rb-

Well good for IDG, TechEye says they failed to see the rise of the iPhone or Android in 2006. History says that a full-frontal assault on a firms core business is not effective. MSFT has to create a market to make iPhone and Android irrelevant. I think the MSFT for MSFT sake opportunity is long gone.

What do you think?

Is IDG dreaming?

Can Windows Phone 7 reach second place on the market by 2015?