Follow us on: Bookmark and Share

About Cody Boggs

Posts by Cody Boggs:


Mobile Virus and Worms

Monday, February 8th, 2010 Filed Under: Mobile Security News

All of us are familiar with cell phones. The use of cell phones to access internet and share executable files have increased. With the growing number of functionalities, the amount of personal data at risk is high. With the growth of the smart phone, mobile phones with Internet connectivity that work like a handheld computer, phone users have also seen the advent of the mobile phone virus. If not handled properly, it may prove to be fatal to our privacy. It is not just PCs that are vulnerable to virus attacks these days-now we also have to protect your phone from mobile phone virus and PDA, too. Advanced mobile phones run the same kind of applications as desktop and laptop computers, and they have multiple wireless connections so they too get infected by mobile phone virus and spread cell phone virus.
There are currently about 100 mobile viruses that can disable a phone or create bills of hundreds of dollars by sending pricey picture messages. The first mobile virus spreading “in the wild” emerged less than two years ago. While this is still a tiny number compared with personal computer viruses, the threat is expected to increase.

Read the Full Report on Mobile Virus and Worms



Is Mobile Banking Safe: Redefining Mobile Security through App Verification

Friday, February 5th, 2010 Filed Under: Mobile Security News

I was told with optimism recently that there is an upswing expected in the use of mobile banking services in the year ahead for key markets within the US and EU. The trouble is however, this growth is hinged on one MAJOR hurdle which is security.

Just the other week for example, news spread from media sources like USAToday.com confirmed that Google (NASDAQ:GOOG) removed more than 50 mobile banking apps from its Android Marketplace. These apps were just a few of the growing number of phishing apps that hackers are releasing into the financial services sector of mobile banking. The questions on the minds of many is, “How could this happen and is my mobile banking app safe?”

Read the full article on Mobile Banking Security here



Exclusive: SMobile Systems Concerns About The iPad, Mobile, Security And You

Tuesday, February 2nd, 2010 Filed Under: Latest News, Mobile Security News

First off, a big thanks to Charlotte and Kevin from SMobile for this exclusive. Today I had the opportunity to speak in conference call with Kevin Thomas, Vice President of Business Development of SMobile Systems, and the security concerns of the Apple iPad coming aboard to the Mobile World. There’s a lot of excitement, a lot of anticipation of the great things Apple has in store, but what about the risks?

In speaking with Kevin, he discussed Apple and how there are big things to be expected because everything that Apple touches is with a Midas touch. Apple has revolutionized the wireless market and has caused a stir by moving other wireless technology to try and match and keep up. Apple in essence, is a product innovator. The new iPad is a 3G device, has the ability to access the WiFi connections. It is very much like the iPhone. It can connect to various networks, but the WiFi networks are open and unsecured connections.

Read the entire article on iPad Mobile Security Concerns



Securing Smartphones: How to Lock Down Handhelds Running Third-Party Apps

Monday, February 1st, 2010 Filed Under: Mobile Security News

Over the holidays, a fair number of workers received shiny new smartphones — or, as David Pogue calls them, app phones — as gifts. Many more spent holiday vacation time downloading apps from mobile marketplaces onto their BlackBerrys, iPhones and ‘Droids.

By the time workers returned to the office in January, a bumper crop of newly installed mobile apps may have gained extensive access to business data and services. What can you do to stop them? Let’s consider “app-store” security implications and steps that employers can take to manage associated business risk.

Mobile device control: Enterprise control vs. personal use

RIM dominates the enterprise mobile market thanks to the tight control that employers can assert over BlackBerry smartphones. BlackBerry Enterprise Servers push employer-defined policies over the air to BlackBerrys at activation time. BlackBerry application policies are then used to install custom and third-party apps and control the resources that each can access. For example, policies can prevent apps from using phone or email services or accessing PIM data stored on the device. BlackBerry IT policies can also be set to block third-party app downloads altogether.



The Rort That Still Is Mobile Data Roaming

Monday, February 1st, 2010 Filed Under: Mobile Security News

The Herald on Sunday produces more evidence today of the perils of using your phone for email and surfing the internet while abroad.

While making calls and sending text messages while abroad has become much more affordable for consumers and the charging schedules easier to understand, the same cannot be said for using mobile data services.

I’ve heard numerous stories of people returning to shocking bills after using their phone to keep in touch via email while abroad.



Mobile Malware Will Test Android and iPhone

Monday, February 1st, 2010 Filed Under: Mobile Security News

Network World - 2009 ushered in mobile malware with the first (and second) iPhone worm appearing just before Christmas. I strongly suspect that 2010 will be a pivotal year in the development of mobile malware. Smartphone software platforms and devices have become sophisticated and flexible enough to allow self-propagating malware and in a world where 9-year-olds are seen holding BlackBerries, the exposure surface is certainly big enough.

Mobile malware still elicits major headlines and is at the center of urgent research as well as speculation. The latest “suspect” came in the form of a banking application that briefly appeared and then was yanked from the Android application market. Security researchers, not having access to the deleted application, are speculating that it was a phishing app that fooled users into installing it as a gateway to banking sites in order to steal credentials and drain bank accounts. Others say it was probably harmless. Unfortunately, since the application was quickly pulled, there is no way to know exactly what it did.



Smartphone Security Next Big Thing

Monday, February 1st, 2010 Filed Under: Mobile Security News

Future smartphones will come preloaded with antivirus software clients to prevent the loss of data and services to malware. And mobile banking and person-to-person payments will be authenticated by fingerprint sensors on the handset.

“Although malware has been seen in mobile handsets, in the past it has not done much damage,” says ABI Research vice president Stan Schatt.

“But smartphones have access to more sensitive data every year, and security must be tightened to prevent the theft or loss of important business information.”The solution: security client software loaded on a mobile terminal, and a service to remotely lock a handset, erase its data, or locate it.

Read the entire article on smartphone security



iPad Security Concerns

Friday, January 29th, 2010 Filed Under: Latest News, Mobile Security News

(ITBusinessEdge) by Kara Reeder

Although the Apple’s iPad has not officially been released, experts are already talking about possible security concerns, reports CNET News. There are a lot of “ifs,” but it’s still worth considering.

Daniel Hoffman, chief technology officer at SMobile Systems, says the iPad could suffer from a number of security issues. If the iPad uses the same encryption as the iPhone, sensitive personal data, such as phone numbers and e-mail addresses, could be at risk of being seen. If iPad users get their apps from the Apps Store, they are at risk of getting malicious apps. An like any other device, the iPad also is subject to man-in-the-middle attacks.

Still, lots of people are eager to get their hands on one, including IT Business Edge’s Ann All.

Read more about iPad Security Issues



SMobile Systems, Mobile Security Review

Thursday, January 28th, 2010 Filed Under: Mobile Security News, Security Shield Main

(Top10reviews.com)

Your personal and business information is more mobile than ever, and so are the threats. Thankfully, mobile security software can protect your mobile device from an invasion from portable predators, including viruses, trojans, and worms.

Why Mobile Security Software?

Malware is on the move, spreading far beyond personal computers. With the growing popularity of smartphones and other mobile devices comes an increase in mobile viruses, trojan horses and worms targeting these devices. These portable predators can be threatening an invasion on a number of fronts, including MMS and SMS messages, downloadable content, public Wi-Fi, or via Bluetooth connections. Proactive protection is vital to safeguard your device from every angle.

Mobile malware can cause a number of serious problems. A mobile virus can drain your phone’s battery extremely fast, delete your personal and important business information, and even render certain features completely nonfunctional. Not only can a virus disable a function on your phone, snoopware may also take control of it, turning your mobile device into a walking tape recorder. It can even turn your camera on and take pictures!

But the nuisance of mobile viruses doesn’t stop there. A virus on your smartphone may send infected files to your contacts or transfer them to your computer when you connect or sync. And what about sending mass messages without your permission, or making expensive calls resulting in unwarranted billing? Malware can do that too.

Not all threats are malicious programs. Not only is your information at risk from mobile predators, the compact size of mobile devices make them easier to misplace. Add to that their expensive nature, and you’ve got a prime target for thieves. Whether you leave your phone in a taxi cab or on a busy restaurant, mobile security software has you covered. There are mobile security software programs that can help you remotely cancel programs on your mobile device, delete your valuable information and even spy on your thieves, increasing the potential of getting your device back!

Mobile Security proactively protects your smartphone from mobile threats. You can rest at ease knowing that your identifying information is safe and your business files are secure. Antivirus protection and firewall settings have become a standard for home and business computers. Why should your mobile device (often containing vital personal information and business secrets) continue to be seriously at risk? With the right mobile solution, you don’t have to sacrifice security for mobility.

What to Look For in Mobile Security Software

Some mobile security solutions are better than others. Some software programs simply perform better than others, and are easier to use. In deciding which mobile security solution is right for you and your phone, keep in mind how much protection you need and which software program your device will support. Below are the criteria TopTenREVIEWS uses to evaluate mobile security software.

Effectiveness
Mobile Security software is only as good as its level of protective proficiency. Regardless of how the program looks or what additional functions it features, it should efficiently and effectively protect your phone. Excellent mobile security will incorporate antivirus, antispam, and firewall security with realtime protection.

Features
A good mobile security solution will have additional features that aid in running the program and effectively protecting the device. The key is including all the right features without burdening the user (and the system memory) with frivolous features.

Ease of Use
Good software must be simple to use, regardless of whether it is on a PC or a mobile device. With the limited resources and size of mobile phones, it is especially important that the security software be straightforward and easy to navigate. The interface and navigation should facilitate and aid users in protecting their smartphones without wasting precious battery life or limiting resources.

Installation & Updates
Installing software on phones doesn’t have to be difficult. Whether you apply directly to your phone or sync to a PC, installation should be quick and easy. Because the most up-to-date protection is crucial, updates must also be provided as soon as possible, and delivered efficiently.

Technical Help/Support
The ideal mobile security software shouldn’t need documentation and further assistance to aid the user, but provides it nonetheless. Help and support for technical or other questions should be provided in a variety of formats, including telephone, email, and online chat with live representatives. Online help should also be available, including instruction manuals and answers to frequently asked questions.

At TopTenREVIEWS We Do the Research So You Don’t Have To.™

See The Complete Mobile Device Security Review

SMobile Systems is the exclusive provider of mobile antivirus for BlackBerry. As you will see in the link above, SMobile is rated #2 as a mobile security software solution. However, being the only provider of a mobile security application for BlackBerry has its advantages.

Read more about SMobile’s Mobile Security Software



Mobile Security Threats and Prevention

Wednesday, January 27th, 2010 Filed Under: Blog, Mobile Security News, Security

Mobile Phone Security

The cell phone and smart phone industry have rapidly developed in the United States and across the world. The days of the phone being used as simply a voice device has come and gone. Today each cell phone has become a small PC in the pocket of each person.

Though the public may remember the basic rules of security when using their home PC’s, they quickly forget that the same risks apply to there cell phones as well. The apple IPhone has set a new standard as to who is using the new generation of smart phones as well as redefining the applications that will be run on the device.

Read more on Mobile Security Threats and Prevention