Category : Mobile Application

Windows 10 PC/Tablets get Instagram app..but with limits

instagram

A little late but none the less, Instagram is available for Windows 10 PCs and tablets! Almost all the features are there, the live feed, stories, notifications, and direct messaging. The biggest feature of all is the ability to view stories and post and edit photos and videos. Not even the web version allows for such features! Sadly, the editing feature is only available on touchscreen PCs and tablets with rear cameras…seriously?

In addition, the formatting of the application is made for such PC/tablets, so when utilized on widescreens the resolution is less than perfect and the wasted space is frustrating.

Odd that an application made for sharing photos and videos would be so limiting on different platforms.


If you would like to learn more about the information presented in this blog post please visit: www.mashable.com 

 

Snapchat is dropping the chat and adding Spectacles

snapchat

The company has been renamed Snap Inc. and is set to release video-recording sunglasses called Spectacles. Spectacles will contain a 115 degree-angle lens, allowing the wearer to record up to 30 seconds of video. If you are an avid Snapchat-er this will change the way you snap indefinitely. Taking the handheld out of the equation, Snap Spectacles allow for greater mobility, and hands free adventures.

You could say Snapchat is getting a head start on virtual reality with their Spectacles. Although a pair will set you back $129.99, I have a feeling this new release will be a sellout hit with the holiday season just around the corner. Smaller than a VR headset, and less expensive than a go pro alternative, and easier to use than with the app on a smartphone, what could be the drawback? From a personal standpoint, design could be seen as a complaint. Unless you like funky colors. The latest marketing advertisement for the glasses showcases the Spectacles in a vivid blue or bright yellow shade.

Although Snapchat daily users averages around 150 million while Facebook daily user count is somewhere around 1.13 billion, Snapchat is still trying to get in the ring with Facebook. Snapchat has gain immense popularity since its introduction a few years ago, and the increased user features and now Spectacles, will only provide the opportunity for more growth.

 


If you would like to educate yourself in more detail about the information presented in this blog post please visit: www.mashable.com 

 

Keep Conversations Private with End-to-End Encryption Messaging

facebook-messenger-encryption1

Messaging is one technological advance that most cannot live without. But most of us would like to rest assured that what we type will be for the eyes of the receiver only, and not a mysterious third party. Regardless of paranoia or worry about hacking, encryption is a sure fire way to protect messages as they leave your finger tips. End-to-end encryption ensures that only the sender and the recipient can read the message. The message is first encrypted on your phone, then sent, and decrypted on the receiving side. Telecom providers, government agencies, and the company that hosts the service itself, cannot read your messages. The provider couldn’t even hand over messages if subpoenaed, because the provider would not have the ability. Hackers that infiltrate the service platform still would not be able to read your encrypted messages.

This sounds almost too good to be true, and not all encryption services are created equal. Encrypted, does not imply end-to-end encryption. Services that encrypt messages between endpoints of transmission, means that conversations are stored encrypted on the platform’s servers, which is not entirely bad. However, since the platform encrypted them they can also decrypt them.

The best end-to-end encryption services on the market today are as follows:

Telegram – Has been around for a while now, which might aid with the biggest hang up on the app, inviting all your friends to join. This over-the-top service does not have the ubiquity of SMS messaging. The app does allow for individual messaging, group messaging for an unlimited number of users, or even public group messaging for a social network feel.

Signal – This is one of the easier applications to set up, automatically authenticating your phone number. It can be used as your default SMS application as well, eliminating hurdles found with over-the-top services. The color custimization for conversations helps with communication clarity, aka not sending the wrong text to the wrong conversation. In addition to private conversations and group conversations with unlimited users, this application also makes calls.

Wire – Wire is a cool alternative for the user that wants message encryption and creative license. The application allows for doodling, location sharing, image sending, and video recording. Despite the feature initiatives, the application doesn’t support some of the escalated group messaging features, and is best used for private one-on-one conversations.

WhatsApp – By far the most popular, this application offers end-to-end encryption and the lure of over a billion users. Hopefully meaning less people you have to convince to install and use a different messaging service. The application is owned by Facebook, which just recently announced they would be using phone numbers and some other account information from  WhatsApp. Hmm. Despite worry, the application proves to be a user friendly messaging alternative.


If you would like to learn more about the information presented in this blog post please visit: www.networkworld.com

iOS 10 Wants to Help you Get More Beauty Rest

bedtime-2bedtime

You’ll find the new bedtime feature offered in iOS 10 in the Clock application. The first time you use the feature you will be walked through the functions. You may notice the application is now in dark mode, finally realizing most of us set alarms when we are already in bed or near sleep.

Begin by setting your wake up time, and tap “Next”. Hit the days of the week you would like the alarm to function. Set the number of hours you need to get each night (don’t worry this can be changed). After you have decided how many hours of precious beauty rest you would like, the application would like to know when you would prefer your nightly bedtime reminders, which can range from the bedtime itself to 15 minutes before or 1 hour before. The new bedtime feature comes with new sounds as well to jazz up bedtime and wake time alarms. Once you have saved your preferences, you will be able to see a short seven day history of your sleep. If you tap “More History” you will be brought into the Health app where you can explore your sleep history by day, week, month or even year.

For those users that use iOS as an alarm clock, consider this to be a major upgrade. It isn’t a full blown sleep tracker as many fitness trackers offer, but it is an easy way to track sleep hours and set up bedtime reminders. How great would this be for kid bedtimes??


If you would like to learn more about the information presented in this blog post please visit: www.howtogeek.com

 

 

Mobile Management Policy – The Essentials

Mobile-Device-Management-43-0

May it be mobile device management (MDM) software or the integration of MDM as a part of enterprise mobility management (EMM) two goals remain : protecting company data and optimizing technology for your company’s needs. Here are 7 Essentials to you mobile device management deployment.

  1. Square One – When it comes to technology it is nearly impossible to create a 5 year plan that even stands a chance. Technology just moves too quickly. Rather you need to constantly evaluate your information technology strategy for the needs and goals of your business. Instead of pinpointing one item in particular and getting bogged down by the details, such as mobile integration, think about how mobile integration can help aid your business goals. And if you can’t get the answer to that question on your own, enlist the help of a trusted Information technology company to help you see the light at the end of your businesses tunnel.
  2. All Aboard – All relevant departments should be represented in strategy sessions, so that all departments can be supported with a unified strategy whether that be for mobile, desktop, applications, web interfaces. Each department will have their own specific concerns and needs which can be better mitigated with a unified discussion and plan. This does not mean you have to enforce a plan that fits all, but rather a plan that brings all together on a similar page, the plan itself can be tailored to fit the needs of each employee or department, depending on user roles and requirements. For example, accounting and sales. Each will deal with different daily tasks, but can share the need of a digital interface to make such daily tasks easier and more efficient. Each department will most certainly use different applications and software, but the mitigation and support for each should be a unified plan.
  3. Put it in Writing – A compliance policy document is the easiest was to eliminate uncertainty and educate the members of your organization. Make sure to spell out eligibility, supported devices, as well as user rules and responsibilities. These can include but as not limited to, reporting a broken, lost, or stolen device, performing regular system and application upgrades. It is extremely important to relay to employees that information technology responsibility is shared between the organization and the members of that organization. This is also a great place to educate your staff on secure practices to keep company data secure.
  4. Teach Your Team – This may seem obvious, but do not roll out a bunch of brand new software without teaching your people how to navigate responsibly. This means taking the time to establish security compliance in combination with procedures and training. Stress the importance of separating personal and company data as well as regular back ups. If a configured network-attached storage (NAS)  is in your company plan for cloud storage, teach your members how to use the cloud rather than Dropbox. If employees are working around secure procedures, it is important to find out why, what interface is causing trouble so much so that employees are avoiding company policy. Then proceed to fix this problem.
  5. Be Well Supported – Trying to support every users on every device brings chaos. Roll out with a limited program with a subset of employees and devices and if you do it right, you should be able to scale to a larger population. Another smart idea is to limit the applications on your mobiles, you can set up you own in house app store for your company’s mobile devices that allows you to pick and choose which third-party applications are available. This should help manage security on all devices, as malware is increasingly present in applications.
  6. Find the Right User Experience – The size of your business is a large factor in how much you will be able to provide and control. Perhaps your small business does not have the resources to set up an in house app store. this should not stop you from find security means to protect your company. You can create your own website with a responsively designed user experience for assorted small screens. You can also convert browser-based apps to native ones.
  7. Who, What, Where are still Important – Mobile device management platforms offer geofencing capability that adds a new dimension to mobile security, by automatically taking action or requiring a different level of sign-on security if a device is taken further than a set distance form the company headquarters. You can even restrict operations this way.

 

The key to viable mobile device management is to develop a unified plan that can be presented to members  in a way that explains their responsibility to the protection of company data. As always, a good IT company is your best friend for safe and secure management of multiple devices.

 

 

 

 

 


 

 

If you would like to educate yourself in more detail about the information presented in this blog post please visit : www.pcmag.com

Threats That Are Spoofing Mobile Enterprise Apps

Nicht jede App ist vertrauenswürdig. Manche installieren Schadsoftware, andere klauen Dokumente oder Passwörter. Von diesen sollte man besser die Finger lassen.

Malware has taken to mobile applications, namely those in the enterprise. Enterprise employees use mobile applications to share data, send packages, manage email, and otherwise juggle the needs of a functioning business. Spoofing applications such as Cisco’s Business Class Email app, ADP, Dropbox, FedEx Mobile, Zendesk, VMware’s Horizon Client, and Blackboard’s Mobile Learn app, makes for very dangerous territory. These spoofed applications are nearly identically to the real counterpart, without serious knowledge of information technology you would never know that the FedEx app you are using is really malicious malware. By impersonating these types of enterprise applications, using the brand and packaging name, unsuspecting users become the host of dangerous malware.

Shuanet is a family of malware that automatically roots a device and installs itself on the system. After Shuanet installs itself on the system it proceeds to install more applications without the permission of the user. These applications are pushed to the phone with the intention to continue installing even more applications and more opportunities to fill the unsuspecting device with malware. With each installation of more applications comes aggressive marketing tactics to try to get a user to bite. Rooted devices are essentially in an altered state, when a device is rooted it is usually for the gain of customization, however in order to remain secure one must know how to configure the security, if they do not configure the device properly the device will no longer receive important software updates. Factory resetting a device infected with malware that installs itself on the system partition, such as Shuanet, will not wipe the malware completely from the device. Apps like these continue to download applications that also house malware, which only adds fuel to the fire.

Examples of apps it spoofs: ADP Mobile Solutions, CamCard Free, Cisco Business Class Email (BCE), Duo Mobile, Google Authenticator, VMWare Horizon Client, Zendesk, Okta Verify.

AndroRAT is another family of malware spoofing enterprise applications. Originally AndroRAT was developed by university students for a class project. It was used as a remote administration tool, as it allows a third party to control the device. Well controlling the device also means allowing the software to collect information from the device such as contacts, call logs, text messages, audio from the microphone, and even device location. Not exactly a comforting piece of information. Hidden remote access software allows attackers the ability to control the device and extract data with nearly nothing standing in their way. Most compromising to the enterprise is the continued remote access to a mobile device. This mobile device is carried throughout the day and it is only a matter of time before the device connects to a business network, allowing an attacker to infiltrate Wi-Fi networks and VPNs.

Examples of apps it spoofs: Dropbox, Skype, Business Calendar

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit:5 active mobile threats spoofing enterprise apps

10 year old finds Instagram bug and cashes in big

facebook-instagramJani, the 10 year old that found a bug in Instagram, probably didn’t know you technically have to be 13 years old in order to even have an Instagram account. You may have to be 13 to have an account but there are no rules against age in the bug and hacking community. Jani found the glitch when he was able to delete any users comments off of Instagram. Jani says he was able to delete any text content he wished to, and although he didn’t proceed to delete any user text, he said if he wanted to he could have. The 10 year old, in true 10 year old fashion, related the severity of the bug to that of Justin Bieber, saying he could delete comments from anyone’s page, even Justin Bieber’s. Don’t worry Bieber fanatics, he resisted, and decided to rather exploit the bug to Facebook, wiping one of their comments from their test accounts and cashing in on $10,000.

The bug was detected by Jani in February, patched that same month, with his check in hand a month later. He has decided to buy himself a new soccer ball and bike. He also purchased two new computers for his brothers. Jani wishes to work as a security researcher when he is older, and we think he’s well on his way.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit:10-year-old claims $10,000 bug bounty from Facebook

 

VMware takes on the big boys with Boxer app for AirWatch

VMware launched a new version of the Boxer iOS app earlier this month and its pretty awesome. The app is for companies using VMware to manage their employee’s mobile devices VMware Boxer is available for both AirWatch and Workspace One customers. The app includes some attractive features, not surprising as Boxer is intended to replace the preloaded Mail feature on the Apple iPhone and iPad.

screen-shot-2015-10-15-at-9-03-16-amThe new app allows for preference customization such as change of sound when new emails arrives. You can also take different actions by swiping email messages, and easily bulk edit messages. The app combines email and calendar taking away the need to navigate away from Boxer in order to see your calendar events. Similar to other applications put forth by Microsoft and Google in terms of functionality.

Boxer VMware will be made free for AirWatch users on the orange, blue and yellow plans. For those who have already committed their email needs to VMware, no need to worry. If you are one of the many that still want VMware purely for email management, VMware will release a special build on the app that will let consumers more more slowly and provide more time between updates. Most consumer and commercial users will be presented with rapid release updates as they are made available, but the extra feature for businesses that wish to update at a slower pace is an attractive option.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: VMware goes after Outlook with Boxer email app for Airwatch

 

Transmission BitTorrent App Infects OS X with First Ransomware…

If you recently installed the Transmission BitTorrent App, most likely you are one unhappy user.

WP15The recently released version of Transmission BitTorrent for OS X contained the embedded KeRanger ransomware, the debilitating program designed to lock and encrypt files in order to extort money from consumers. In case you didn’t read our previous post about ransomware, this malware is extremely debilitating to consumers and business owners alike. It locks files and infiltrates all external hard drives and shared networks, making external hard drive back up prevention useless in protecting sensitive data.

The March 4th version 2.90 of the application contained the malware. The Transmission’s website is encouraging all users who have downloaded this version to upgrade to version 2.91 or at a bare minimum delete the 2.90 version from their computers. If you would rather, wiping and restoring your system to an earlier time period is also an option. Make sure if you utilize this option, that you restore your device to a period before the Transmission 2.90 installation.

Now if you find yourself infected, resist paying the $400 asked to restore your files. There is no guarantee that paying this fee will result in any data retrieval and could possibly be a complete waste of your money. If you decide to do nothing, at least remove the malware installed. Leaving the installation only allows the ransomware more opportunity to further exploit your system.WP14

If you would like to do a little investigating of your own, a new blog post from Palo Alto Networks’ threat intelligence team lists the steps for finding out if you have been infected with the KeRanger ransomware.

If you would like to educate yourself in more detail about material presented in this blog post please visit:

http://www.pcmag.com/article2/0,2817,2500391,00.asp?mailing_id=1587787&mailing=DailyNews&mailingID=510C4584BD5C3E3CDD5A15D97D2B87C0

 

Photoshop Touch – for iPhone or iPad

In today’s world of smartphones replacing the use of caring a camera it would be also be great to have a tool that can easily manipulate and fix your photos. This tool will give you a bit more features to edit photos, lighten, darken or and filter your photos. Below are some of the features you might find handy.

Features
• Layers: Combine multiple images, adjust layer order, control individual layer opacity, edit layers individually
• Versatile image browsing and acquisition: Select photos from multiple sources (including Facebook, Google Image Search, or iPad camera live feed)
• Sharing through Facebook: Share to Facebook and see comments within Photoshop Touch
• Interactive tutorials: Step by step instructional video tutorials within the app.
• Selection tools: Standard selection tools plus protection selection to protect parts of the image you do not want to edit.
• Photoshop effects and filters: Variety of filters and effects popular in the full version of Photoshop available within app.
• Filter brushes: Add filter effects onto photos only where you want them.
• Edge-aware painting: Auto-detects where paint should stop, eliminating the need for tedious selections.
• Refine Edge: Tool assists in selecting complex photo elements such as hair or fur.
• Tone and color adjustment: Tone and color adjustments can be made to entire images, selections, or individual layers.
• Photoshop compatible file format: Compatible file format for Photoshop CS5 (after plug in download) allows you to move work between your computer and iPad via the Adobe Create Cloud.
• Text: Add text and text effects such as strokes, drop shadows, and fades.