An Apple a Day Keeps The Entrepreneur Away


Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Apple devices have struck like an eye-popping thunder bolt in midst of the dark boredom filled consumerism of our generation. The iPhone and iPad have taken the term ‘user-friendly’ to a whole new level and have generally met great resonance from people belonging to all walks of life. Same holds for work places, however many experts are skeptical about Apple’s ostensibly clandestine ways regarding security issues, which according to them render these devices incongruous for adoption by enterprises.

And then the Siri Popped out of the Bottle…”your wish is my DEMAND!”
Most of us our familiar with the magical feature Siri in iPhone 4S and for those who have been living on the moon for most of recent history it is a virtual assistant that on the surface works like a genie allowing you to command your tasks like sending messages. It has the capacity to understand your voice, know those meanings that are traditionally not expected to be translated in binary logic and even talks back to you. So basically it can be an easy way for you to communicate with your iPhone, a really smart virtual assistant that understands your multiple commands intelligently (basically the Robin to your Batman) and can be your companion in emptiness- well you can excuse this one. For those of you raising eyebrows with arrière pensée lingering on their minds that it’s just too good to be true…Behold!

Take out the big guns and start aiming for the Apples
IBM disables Siri on employee iPhones as a sensitive security concern because the voice data exchanged is uploaded to the Apple cloud. Several calls have been made to Apple for revealing the purposes and processes for storage and analysis of this data. However, the fact that Apple has shown inactivity in this matter is being perceived by many companies is suspicious and apathetic. Chris Eng, a research official at Vera code favors this point by implying that the phones might not be capable for the computational capacity that it requires. But he still points to the fact that Apple should make public what they are doing with this data by coming out and saying that they are not storing it, if that’s the case. Daniel Ford, chief security officer at Sterling also agrees with Eng in that he does not find it surprising that enterprises are intimidated by it as there is no official word about it from Apple. Paul Henry, a security and forensic analyst at Lumension represents another brick in this wall, as he points out how there have been privacy and security concerns associated with Apple previously.

Apples and Oranges
Henry also notes that Google and Microsoft have been more disclosing with regards to security in their products where as Apple, despite consumer-orientation, has not developed such terms with security managers and enterprises as of now. Nonetheless, he adds that there are certainly clear signs from Apple to being more responsive regarding security so that they can also be adopted in government sectors and enterprises as readily. Apple’s release of “iOS Security, May 2012” is documented explanation about security in iOS devices, an important example in this vein.

While Apple devices continue to spread across the Globe and are met with great enthusiasm amongst private users, there remain some fears and insecurities about security on the part of enterprises which can be attributed a lack of responsive by Apple in the past. However, the trends have been changing and it might not be long before the strained relationship is straightened out.

TrustR Identifies Smartphone Security Concerns


Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Have you ever gotten a virus or had someone hack your account? With all the private data you store on your computer, it can be a gut-wrenching feeling. Today’s smartphones offer the same worries. Your phone can contain all of your contacts, web browsing history, private messages, photos, videos, and access to lots of online accounts. Luckily, the likelihood of your phone data and access being compromised is minimal, but it’s always better to play it safe. There are several options out there to help you protect your smartphone from potential threats, but the one I am going to review today is called TrustR from Rookie Systems.

Untitled

Identify Smartphone Security Threats

TrustR is an app that scans your device to locate security issues found in other apps. The system that it uses is based on a large database of known security issues and is updated by security professionals daily, according to the developer. The operation couldn’t be easier. After installing the app, you press a giant button (aptly labelled “Press”) and it scans your device, comparing installed versions applications against their central database. From there, it identifies matches in three categories:

Existing Security Problems – These are all the apps that have some level of insecure data or some other issue that may compromise your data or device.

Malicious Apps – These are apps with known malicious behavior such as theft of information or spying built into the app.

Patched Apps – These are apps that had a problem at one point that has since been resolved.

The free version shows the first three threats, and the paid version ($3.99) shows you all threats. After you’ve discovered potential threats, it is up to you to upgrade or remove an app or decide that the threat doesn’t warrant removal or upgrading.

How Well Did It Work?

As mentioned, the app is incredibly easy to use, which is refreshing for a security application. This is because Rookie Systems smartly decided to stick to what’s important.

Untitled
Untitled
Untitled

I was not too surprised to see a few popular apps I use daily had very minor infractions that I’m not worried about. I was a little surprised to find that my PayPal app had a pretty serious man-in-the-middle hole in it several upgrades ago. It’s been fine for a while, but I wonder how long the hole was there before I upgraded.

Although it wasn’t listed as a paid feature, the paid version of TrustR asked for permission to send me push notifications. I agreed, thinking that this would generate a warning when I installed a new app. Sadly, when I removed and then re-installed the WordPress app, there was no notification. I can only imagine, then, that this allows TrustR to periodically alert me if a new threat is added to their database that matches an already installed app. The more I think about it, it would be great if TrustR did both.

Over all, four bucks seems like a jump from free without additional features (other than the unlimited warnings) but it also feels like a good price for piece of mind. Download the free version and list your top three problem apps in the comments below.

This review, although sponsored, contains my honest opinions of the product reviewed.

Thief Caught Stealing From A Security Company Booth At CES


Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

As you may know, I had my own little security problem at my house when a guy was repeatedly urinating on my storage building in the wee hours of the morning (no pun intended). Luckily, I was slated to review a very flexible and professional security camera system and caught the guy on video before catching him in person. The video and photo are in that post above, but today I learned of something just as interesting that happened at CES.

In the incident I referenced above, my late night visitor had no way of knowing I was recording him because I hid the camera very well and it was dark and late. In this story, the star of the video, Willy Wu, walks up to a booth, picks up the contacts book full of information from potential clients looking for further contact from the company, leafs through it, and casually walks away with it. At any other booth, he may have gotten away easily in a show as enormous as CES. Unfortunately for Wu, the booth he took the book from was that of Swann Security, a global leader in security monitoring solutions. Now that’s just dumb.

According to the article, Swann staff caught up with the guy at CES pretty quickly and he handed over the book without hesitation, but then ran off. Eventually, they’ll catch back up with him, but the important thing here is that he didn’t get away with all that client data.

Have any similar stories? Share below.