Welcome!

Virtualization Authors: Yeshim Deniz, Max Katz, Liz McMillan, Jnan Dash, Michael Bushong

Blog Feed Post

Mobile Cyber Security News Weekly – Week of May 25, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

China’s decision to suspend its involvement in a cyber security working group with the U.S. after being accused of commercial spying has threatened to undo efforts aimed at finding common ground to tackle hacking.  Read Original Content

Nokia has decided to launch a dedicated security unit that will act as its central office for security processes, partnerships and guide for developing product.  The new unit will help ensure new products have security baked in, enhance the portfolio of security products and services, and develop business models around telecom security.  Read Original Content

A recent survey showed 84 percent of organizations allow access to public cloud services like Dropbox and 65 percent don’t encrypt data between cloud and mobile devices.  Read Original Content

The True Cost of Mobility - Companies are under tremendous pressure to develop and deploy mobile apps for their business systems, yet the traditional approach to mobile app development typically costs $250K+ and takes 6+ months for a single app. Today IT professionals are exploring platforms that radically reduce costs and time-to-market for their mobile initiatives, especially around complex applications such as SAP, Oracle, or custom applications. Download the whitepaper - https://www.capriza.com/resources/whitepapers/?resource=true-cost-of-enterprise-mobility&adgroup=MES

Thirty-five percent of apps consist of malware, 80 percent of mobile apps pick location information, 82 percent can identify device ID, and 57 percent record the usage of the phones.  Read Original Content

The Korean government has developed a security chip to protect smartphones from hacking. The chip, dubbed MeeMo, can protect users’ password, official authentication and other private information from cybercrimes that target smartphones.  Read Original Content
According to reports, a brand new Android bug has been detected that allows harmful apps to take control of smartphone cameras and upload the images to an unknown server without the user's consent.  Read Original Content

According to Symantec's latest Norton Report, nearly half of mobile users don't take basic security precautions, such as passwords, security software or back-up files for their device and more than one-third of mobile device users experienced mobile cybercrime last year.  Read Original Content

Samsung and Apple have added fingerprint scanners, the most basic application of biometric security, to their phones. Senator Al Franken wants to warn Americans that fingerprint scanning is not as safe as you think. "Fingerprints are the opposite of secret. You leave them on countless objects that you touch throughout the day.”  Read Original Content

Samsung is taking smartphone security to a whole new level. The company intends to include Iris (Eye) Scanner Technology to its future smartphones to provide additional layer of security, says The WSJ.  Read Original Content

The International Business Times reported a forthcoming Facebook mobile app update will be able to collect and save data captured by your smartphone’s microphone--a development that privacy experts find worrisome.  Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com

How Many Solutions Does it Take to Implement Enterprise Mobility?
Information Dominance as a Company's Mobile Strategy
Mobile Expert Interview: Mobile Labs' Dan McFall
Highlights from the Enterprise Mobility Focused Conference M6 Mobility xChange Last Week
Mobile Strategies They Don't Teach in Business Schools or Computer Science Labs
Insurance Disrupted - Crowdsourced Policies and Social Marketing

Webinars of Note (Recorded)

Rapidly extend any enterprise application to mobile devices without coding, APIs, or integration.
Virtualization ≠ Mobilization

Whitepapers of Note

A Comparison of the StarMobile MORPH Protocol vs. Traditional Remote Computing Protocols
Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization
Managing BYOD and Legacy Systems
The Secret to Enterprise Mobile Application Adoption
Solving The Mobile Developer Scarcity Problem
StarMobile Transforms Enterprise Apps into Mobile Apps
The True Cost of Mobility

************************************************************************
Kevin Benedict
Writer, Speaker, Editor
Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
Recommended Strategy Book Code Halos
Recommended iPad App Code Halos for iPads

***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Read the original blog entry...

More Stories By Kevin Benedict

Kevin Benedict is the Senior Analyst for Digital Transformation at Cognizant, a writer, speaker and SAP Mentor Alumnus. Follow him on Twitter @krbenedict. He is a popular speaker around the world on the topic of digital transformation and enterprise mobility. He maintains a busy schedule researching, writing and speaking at events in North America, Asia and Europe. He has over 25 years of experience working in the enterprise IT solutions industry.