Mobile

Catastrophic data loss for Sidekick users

Read more in my article at Naked Security.

Shouldn’t protecting iPhone users from phishers be easier than this?

Read more in my article at Naked Security.

How I cheated on Steve Jobs with an Android

Read more in my article at Naked Security.

iPhone, iPod Touch, and QuickTime security updates

Yesterday, a standing ovation greeted Steve Jobs as he made his first public appearance since his liver transplant. Apple fans around the world (and I’m one of them) were, I’m sure, delighted to see the charismatic CEO back on stage announcing his firm’s latest product developments.

With so many feverish rumours about the possibility of The Beatles coming to iTunes (they didn’t) and the possibility of an Apple Tablet computer (no signs yet), some inevitably felt a sense of anti-climax when the main announcements from San Francisco were some new features in iTunes, a point upgrade to the iPhone OS and the revelation that the iPod Nano – and strangely not the iPod touch – was gaining a video camera.

Are you going to allow Spotify in your company?

Read more in my article at Naked Security.

Is your smartphone encrypted?

Read more in my article at Naked Security.

How to stop Spotify

Read more in my article at Naked Security.

iPhone update fixes ‘SMS of death’ vulnerability

Read more in my article at Naked Security.

BlackBerry customers revolt after spyware scandal

Read more in my article at Naked Security.

Hacking into mobile phone voicemail systems

Read more in my article at Naked Security.

Apple update fixes 46 iPhone security vulnerabilities

Read more in my article at Naked Security.

Safari 4.0 brings over 50 security patches

Read more in my article at Naked Security.

Iranian media falls for Obama BlackBerry hack hoax

Read more in my article at Naked Security.

How to control a BlackBerry Enterprise Server with just a PDF

Read more in my article at Naked Security.

BitTorrent on iPhone? Apple says “no thanks”

Read more in my article at Naked Security.

Russian Malware Blocks Windows Use, Demands SMS Ransom

How important is it for you to be able to access your data? Would you pay money to recover your data if a hacker stole it?

Read more in my article on the Dark Reading website.