Tag Archive for IOS (Apple)

Tablet Notes

Tablet computer ownership will lead the industry over the coming 12 months as all-in-one devices continue to grow in popularity according to the CEA.

Windows 8 Tablets in November

Windows 8 Tablets in NovemberExpect the first wave of Windows 8 tablets to land in retail stores in November, according to CNET. A secret source deep within Intel (INTC) says the Intel-based Microsoft (MSFT) Windows 8 tablets will use Intel’s upcoming Clover Trail Atom chip. DailyWirless says that Clover Trail is Intel’s first dual-core Atom design based on its 32-nanometer process technology.

The author says the tablets will fall into two basic sizes: pure 10-inch tablets and hybrid 11-inch designs with physical keyboards. Windows 8, like Windows 7 before it, will be powered by chips from Intel and AMD (AMD) and will be able to run older, so-called “legacy” applications.

A separate release from Microsoft, Windows RT, will land on devices powered by ARM (ARMH) chip suppliers NVidia (NVDA), Qualcomm (QCOM), and Texas Instruments (TXN). RT will not run older Windows applications.

Chinese Tablet PCs Peel Away at Apple

Chinese Tablet PCs Peel Away at AppleApple Inc may find it harder to keep market share in China because homegrown tablet PC brands will win over more customers says a report on China Daily.com. Sun Peilin with Analysys International, told China Daily, Apple’s (AAPL) market share will shrink to about 70 percent, “Chinese tablet PC makers are trying to form a stronger echelon behind Apple by taking over the market share that belonged to small copycat manufacturers.

Apple’s iPad and iPad 2 took 78.3 percent of the market share in China in Q1 2012, distantly followed by Samsung’s (005930) 5.1% and ErenEben’s 4.5% according to the article. AI’s data indicates tablet PC sales in China are expected to break 4.5 million units. Companies including Lenovo (LNVGY), Acer (ACEIY) and home appliance giant Haier Group, are releasing their own tablet PCs.

Sun from Analysys states in the blog the biggest obstacle Chinese brands face is how to come up with a different marketing angle against Apple, to avoid head-on competition with the iPad. “There are two separate markets for tablets: You can either go entertainment or business. The iPad is a big competitor in terms of entertainment, so Chinese companies should be different from iPad,” Sun suggested. Some Chinese companies have already differentiated their tablets. Beijing ErenEben Information Technology Co, a business tablet PC maker, won a government contract to provide tablets to the police department in the Guangxi Zhuang autonomous region.

According to Fang Liyong, COO of ErenEben, the company sold nearly 150,000 units of its first two generations of products in 2010, making it the biggest homegrown tablet PC brand by sales volume. “We are now selling nearly 30,000 units every month in 2011,” he said.

With a touchscreen developed by Japanese graphics-tablets maker Wacom Co Ltd, the ErenEben tablets were designed to offer an experience similar to writing on real paper. The COO boosts, “ErenEben has great growth potential, because China’s tablet market is so big, and Apple cannot take it all.”

iPad Suit

iPad SuitMohan’s Custom Tailors of New York is taking the boring and basic out of the word “suit” by designing a new and improved version for the modern man. According to their website, as men are dressing up and going out to dinner dates, museum galleries, and lounges in fine style, Mohan’s is creating contemporary and handsome designs to fit their needs. Mohan’s has introduced the fashion of the future with their new tech offerings, including pockets for your Research In Motion (RIMM) Blackberry, Apple (AAPL) iPod, iScribe, Bluetooth, and more. Most recently, they have revealed the first-ever iPad pocket in menswear, creating a fashion rush for “techies” around the world.

iPad Bacon Case

iPad Bacon CaseAt Antje Schmitt’s storefront at Etsy, the famous handcrafted Bacon Case for the Apple (AAPL) iPad 3 is now available. The Bacon Case is also available for older iPads, MacBooks, Netbooks, and Notebooks.

ZD.net – “The undisputed king of the weird category however, is the iPad bacon case ($59, pictured), which I’m ordering immediately.”

Gizmodo – “It’s $59, but who cares? Bacon iPad cases are what money was invented for, people. Well, that, and both actual bacon and actual iPads.”

Gearfuse – “Bacon and Apple products go together like peas and carrots. Or lamb and tuna fish. They’re both the perfect byproducts of their respective categories. Pimp your iPad with pork with the custom-made Bacon iPad case. It might not be actual bacon, but it’s realistic design is enough to make you wish you had a side of eggs to go with your balanced breakfast of pork and tablet.”

Clueful Scans Your iOS Apps For Privacy Behavior

Clueful by BitdefenderSecurity firm Bitdefender has introduced Clueful, an app that scans your Apple (AAPL) iOS apps lets you see what information other applications installed on your iDevice might have access to. Once downloaded and installed (iTunes), the $3.99 app scans your iPad 3, iPhone 4s or other iOS Apple products to see what’s installed and puts it in a list that can be filtered based on the various kinds of behavior. This includes things like:

  • Apps that can track location
  • Apps that can read the address book
  • Apps that might drain battery
  • Apps that use iPhone’s unique ID
  • Apps that display ads
  • Apps that gather analytics

These behaviors are listed in the results and explained on each app’s detail page. However, Clueful doesn’t log how often these behaviors happen. Clueful also notes if your data is encrypted, and if app makers anonymize you as a user, CNET News.Com reported.

Besides scanning what you have downloaded, the article explains that the software is designed to let you research what kinds of information an application wants to use before you buy it from the App Store. However, the author says, ” this appeared to be a work in progress, it is slow and unable to pick up a handful of big name games and apps.”

Bitdefender maintains all the data behind the privacy analysis, and users can ask to have apps that are not a part of that system analyzed. CNet states that Clueful comes some three months after Apple came after fire for the fourth time over how iOS and apps log and send user information to third parties.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

If Elvis had an iPad

If Elvis had an iPadBoingBoing brings us news of the Futulele from music app developer Amidio. What is a Futulele? Why it’s a ukulele synthesizer that combines an Apple (AAPL) iPad with an iPhone in a dedicated guitar-shaped case. The iPhone is used for chords and the iPad is used for strumming. The iOS devices are connected to each other via Bluetooth.

Amidio says it’s still looking for a hardware partner to build the case, but then there’s an app for that due out in April. Just in time to be one of the first music apps optimized for the iPad 3.

Elvis Presleyrb-

I wonder what Elvis would have thought about Can’t Help Falling In Love being played on an iOS-based jury-rigged Ukulele.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

QR Codes Can Put Users at Risk

-Updated 01-26-12- It was just a matter of time and now the Websense (WBSN) ThreatSeeker Network has started spotting spam messages that lead to URLs that use embedded QR codes. According to a report at Help Net Security, this is a clear evolution of traditional spammers towards targeting mobile technology. The spam email messages look like traditional pharmaceutical spam emails and contain a link to the Web site 2tag.nl. Once the 2tag.nl URL from the mail message is loaded in the browser, a QR code is displayed, along with the full URL. When the QR code is read by a QR reader, it automatically loads the spam URL.

QR Codes Can Put Users at RiskQuick Response codes (QR codes) are a “new” type of barcode that can be used for a variety of purposes tracking, ticketing, labeling of products, etc. They can be put anywhere, in magazines, buses, websites, TV, tickets, and on almost any object which they might want to learn more about.

QR codeHelp Net Security writes that when used for legitimate purposes, they make life easier for users. “All you need to ‘visualize such a code is a smartphone with a camera and a QR reader application to scan it – the code can direct you to websites or online videos, send text messages and e-mails, or launch apps,” point out BullGuard’s researchers.

Unfortunately, QR codes can just as easily be used to compromise users’ mobile devices. “Much like URL shortening services can be and are used maliciously because of the fact that they obscure the real target URL, QR codes can also be used for such deception,Joe Levy, CTO of Solera Networks told DarkReading. “QR codes … provide a direct link to other smartphone capabilities such as email, SMS, and application installation. So potential attack vectors extend beyond obscured URLs and browser exploits very nearly to the full suite of device capabilities.”

Mobile malwareThere are several ways attackers are already using malicious QR codes to perpetrate their scams. A recent attack via QR code “Attaging” took place in Russia and involved a Trojan disguised as a mobile app called Jimm. Once installed, “Jimm” sent a series of expensive text messages ($6 each), racking up unwanted charges.

On Apple (AAPL) iOS devices, hackers are sending users to websites that will jailbreak the device and install more malicious malware. Tomer Teller, security evangelist at Check Point Software Technologies, told DarkReading, “a user scans a barcode and is redirected to an unknown website … the user phone will be jailbroken and additional malware could be deployed (such as key loggers and GPS trackers).

Google AndroidOn the Google (GOOG) Android  … Criminals are redirecting users to download malicious applications. All a user needs to do is scan a barcode and it will redirect to a website that will download the Android Application” according to the article.

In addition, attackers are using QR codes to redirect users to fake websites for phishing. “A QR code will redirect to a fake Bank that will look exactly like your bank. Since most smartphone screens are small, a normal user may not see the difference and will type in his or her (information) and hand it to the attackers,” Teller says. According to Mobile Commerce News some apps, like the NeoReader from Neomedia, that collect personally identifiable information (PII). This information is then sent to third parties who mine the data and possibly resell it.

mobile QR based paymentThe trend to mobile QR-based payment systems from firms like LevelUp, Kuapay, and Paypal are developing will drive QR code malware forward Mr. Levy says. “As our mobile devices and our wallets continue to converge through such technologies as near field communications (NFC), Bump and QR, malware authors are bound to prefer these very direct paths to the money. After all, these devices and apps are well on the road to becoming our new currency.”

So how do you protect yourself and the data on your mobile?

  • Download an app that scans QR codes and barcodes and shows the URL to which the codes want to take you. “Only use QR code reader software that allows the user to confirm the action to be taken i.e. visit a website link,” Paul Henry, security and forensic analyst at Lumension told DarkReading. “If you do not know and trust the link, cancel the action.
  • Do not scan QR codes from random stickers on walls and similar surfaces. Help Net Security says scammers are counting on people to do that because they can’t curb their curiosity.
  • Consider installing a mobile security app on your device, especially if it runs the Android OS. “Android is an open platform, which means that its source code can be examined by criminals and exploited easily when they find a weakness in, say, the Android browser,” according to the article. “That’s why most malicious apps transmitted via QR codes target the Android-based smartphones.”

rb-

I am not a fan of QR codes they seem to take you to an advertisement. Most of the destinations are fluff at best and dangerous at worst. Now that they have become nearly ubiquitous, they present more risk than necessary. Avoid QR codes.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Which Mobile OS is Most Hit by Malware?

Which Mobile OS is Most Hit by Malware? Help Net Security reminds us that most mobile phone users still don’t have a mobile AV solution installed on their devices making. This makes it hard to gauge just how many of them have been hit by mobile malware. To overcome this fact, Microsoft (MSFT) researchers observed that mobile phones often get synched with the users’ computers. Also, users often use their computers to search for mobile apps on third-party application markets and file-sharing sites. These habits allow mobile malware to occasionally end up on their desktop/laptop computers and gets detected by desktop anti-virus software.

MicrosoftResearchers at the Microsoft Malware Protection Center (MMPC) were able to use thes detection to get an idea of what malware attacks the various mobile operating systems. The MMPC found was that Symbian users’ devices are getting hit with a disproportionately bigger number of threats than those targeting other operating systems. In August 2011, Microsoft detected around 42,000 of them.

Malware attacks

Microsoft’s Marianne Mallen says that Symbian-specific malware seems to be evolving and Zeus-in-the-mobile (“ZItmo“) and SpyEye-in-the-mobile (“Spitmo“) are the most recently detected malware and arguably the most dangerous for the user.

JavaThe Sun Oracle (ORCL) Java ME platform takes second place in the MSFT research, with nearly 24,000 threats detected in August 2011, mostly apps sending text messages to premium-rate numbers.

The MMPC found that Google‘s (GOOG) Android malware numbers were rather low when compared to Symbian and Java ME platforms. There were around 2,800 hits in August, but have been steadily rising since February. Much of the Android malware uses privilege-escalation exploits to install itself or other components on the device without having to ask the user for permission.

At the end of the MSFT list are Apple (AAPL) iOS and Research In Motion (RIMM). No new threats for Apple’s mobile OS have been discovered this year, and the total number of threats detected in August was around 590. RIM brings up the rear with only 5 malicious apps detected during that month and can boast of only one completely new threat springing up for it this year:.

Apple ComputersMs. Mallen’s advice to mobile users is to scan applications downloaded when possible, even when it’s already on a mobile device. Ms. Mallen says that even apps from the official app stores, may have been repackaged with malware that can run stealthily without the user being made aware of the underlying payload,” she points out. “The payload can include data-theft, silent SMS-sending in the background, and downloading and installing of other malware components, among other things. This malware (or links to it) could also be spammed or sent through email, using social engineering to entice the user to download a copy of the malware onto the desktop.”

rb-

UMMM no critique of mobile malware issues on WinPhones?

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Security Tips

Tablet Security Tips ICSA Labs, an independent division of Verizon has provided third-party testing and certification of security products since 1989. They suggest a series of security tips for smartphone, tablet, or app user’s Help Net Security reports.

Only buy apps from recognized app stores

App storeApps from unofficial third-party stores and applications downloaded from peer-to-peer sites are much more likely to contain malware than apps sanctioned by official vendor stores such as the Android App Market or Apple App Store.

Think twice about accepting permissions

Most applications, legitimate as well as malicious ones, need users to accept several “permissions” before the apps are installed. Check carefully to be sure that the app comes from a legitimate source. I wrote about mobile phones leaking data previously.

Monitor bills for irregular charges.

Monitor billsIf attackers gain access to personal information stored on the mobile device, they can quickly rack up charges by sending “silent” text messages to high-priced call services. For example, if the Google (GOOG) Android Trojan GGTracker is inadvertently installed on a device, it can sign up users, without their knowledge, for premium text messaging services.

Employ security policies to protect employer-issued devices

Employers should enforce password-based access and require voice mail codes so that only authorized users can get access to data on employer-issued devices.

Be mindful of more personal devices at work

more personal devices at workCompanies must have security systems and policies in place to safeguard their business environment and prevent access to company networks from employees’ personal devices. I wrote about BYOT here.

Remember that a tablet is a tiny PCs

Many security threats that apply to traditional computers also apply to mobile devices, such as smartphones and tablets, and consumers should take necessary measures to protect themselves. One way to do this is to install anti-malware software on mobile devices and enable VPN functionality.

Protect your tablet, smartphone, and voicemail PIN

Protect your tablet, smartphone, and voicemail PINIf your mobile phone does not have a password, add one that is at least six digits. Try to choose a unique password that is not already used across other systems and accounts. Do not use repeating digits in passwords or voice mail pins. Remember that your provider will never request your voice mail pin, so do not be tempted to give it to anyone who requests it.

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.