Archive

Posts Tagged ‘cell phones’

One step forward – two steps back.

June 26, 2008 1 comment

eraseiphone.jpgAs reported by AppleInsider, Apple’s iPhone 2.0 software enables secure erasure of your personal data, however, it also moves Apple away from iSync compatibility and into their own little cloud of interoperability.isync.gif

Remember iSync?

Back when Palm dominated the PDA world, and Apple had zero inkling of their own phone hardware, they got the bright idea to make hooks in the software to sync phone numbers, addresses, calendars, notes and more between Apple computers (remember those?) and phones and PDAs from other companies. Read more…

Chat Much? Is it secure?

June 9, 2008 Leave a comment

mundu-iphone.jpgDeclan McCullagh has a great overview of the security of Chat. And by chat, I mean computer and cell phone instant messaging.

The question of whether your IM chat is secure is really several questions:
Are you wireless, and is the wireless connection secure?
If you are wired, was there a secure log on?
Does it provide complete encryption?

If you’re discussing your thoughts on the latest action film, the security probably isn’t top of mind. But if you use IM for business and discuss proprietary ideas, work-for-hire, or use it to get other sensitive information- like logins or passwords to something else, then the security of your chat is paramount. Read more…

Cell Phone Security- is NOT!

May 20, 2008 Leave a comment

inbox.gifAs I mentioned back in December, your life on a cell phone is not as secure as we would like it to be.

A recent iPhone Atlas article, that TUAW reported, and Engadget noted, tells of iPhone guru and author Zdziarski clearly demonstrated how difficult it is to truly erase your data, even when you want to, let alone, if your phone just gets misplaced or stolen. Read more…

Cell Phones, Wireless Keyboards & data secuity— or not!

December 6, 2007 1 comment

finger3.jpgThe biggest difference between Mac OS-9 (and earlier) and X is that the owner of the machine is not the sole user. By this I mean that OS-X integrated the multiuser OS architecture that the person who bought the machine is always one of many users (even if they are the only user).

A recent iPhone article brought this to light because, now, as phones and PDA’s get more powerful, they too could benefit from multi-user technology that would let you hand your phone/ pda/ web browser/ ipod/ mail tool, to someone else to make a call, without giving them complete access to all your private e-mail, web browsing history, and more. Apple’s simple “slide to unlock” is simply not enough… Read more…

Cell Phones, Wireless Keyboards – data security – or not!

December 6, 2007 2 comments

finger3.jpgThe biggest difference between Mac OS-9 (and earlier) and X is that the owner of the machine is not the sole user. By this I mean that OS-X integrated the multiuser OS architecture that the person who bought the machine is always one of many users (even if they are the only user).

A recent iPhone article brought this to light because, now, as phones and PDA’s get more powerful, they too could benefit from multi-user technology that would let you hand your phone/ pda/ web browser/ ipod/ mail tool, to someone else to make a call, without giving them complete access to all your private e-mail, web browsing history, and more. Apple’s simple "slide to unlock" is simply not enough…

Read more…