Mobile normal hits the workforce

This post is sponsored by Samsung Business. All thoughts and opinions are my own. This is the first post in our sponsored series with Samsung Business.…

How to check if an iPhone is stolen

A new Apple tool allows users to check whether a iPhone has Find My iPhone turned on by typing in the device’s unique identifier into a web form on

Google ups the ante on email encryption

The Mountain View giant’s new extension, still in alpha, for Gmail users promises better email encryption, something that some email providers are skimping on, according to new data provided by Google.

U.S. may have bugged German chancellor’s mobile phone

Germany’s leader, Angela Merkel, has confronted U.S. president Barack Obama over the likely tapping of her communications. The White House has said the U.S. “is not monitoring and will not monitor” her communications, but has not denied doing so in the past.

The Apple Roundup: Don’t forget about the iPod

Here’s our daily pick of stories about Apple from around the web that you shouldn’t miss. Today’s installment: The iPhone 5 event will also include iPods, Apple’s winning event formula, the security expert who solved the Apple UDID mystery, more iPads in the air, and more.

Mocana raises $25M to secure the enterprise app boom

Mocana, a startup that is dedicated to securing the Internet of things has raised $25 million in a Series D round led by Trident Capital. While securing devices is Mocana’s biggest business, the fastest growing product is Mocana’s solution for protecting mobile applications.

The Apple Roundup: Working at Foxconn is better, still not great

Here’s our daily pick of stories about Apple from around the web that you shouldn’t miss. Today’s installment: Update on Apple’s independent audit of Foxconn, warnings about tinkering with iCloud folders, iTunes account security, Apple ads and “common sense,” and the iPhone’s success in China.

A more open Apple will talk iOS security at Black Hat

In another sign of the changing culture at Apple, the company is planning to speak at one of the premier information security conferences, Black Hat 2012, for the very first time. Bloomberg reports that Apple representative is set to address the conference about iOS security.

New AT&T service could block future smartphone thieves

AT&T could soon let customers sign up lost or stolen devices to a “block” list that will shut off voice, data and texts but not turn off the account, according to The Verge. A device would be unusable, even if the SIM card was swapped out.

Hands-on review: Zomm Wireless Leash Plus

If you’ve ever lost or misplaced your keys, your iPhone or your iPad, the Zomm Wireless Leash Plus can help remind you where you left them. This little multi-function device can also act as a wireless speakerphone. We tried it out, here’s what we found.

PayPal offers bug bounty to uncover security holes

PayPal, one of the first companies to offer a bug reporting program, is following the lead of Google, Facebook and Mozilla and is now upping the ante with a paid bug bounty program, which will reward researchers for finding holes in

Sourcefire brings big security data to IT departments

Security-software company Sourcefire is trying to help large-enterprise IT teams leverage big data analytics in fighting malware. A new product, called FireAMP, utilizes a cloud-based analytics approach to let IT teams dig deep to find out the hows, wheres and whys of their malware problems.

Cloud security: Better than you think

Security concerns are always cited as the primary inhibitor to wider cloud adoption by businesses, but Capgemini CTO Joe Coyle says the security model for the cloud is already here and working just fine, thank you very much.

Amazon AMI vulnerabilities overblown, experts say

The latest kerfuffle about alleged vulnerabilities in Amazon Web Services’ Amazon Machine Images is little more than a tempest in a teapot, according to security experts. Their takeaway is basically that stupid users with bad computing practices get what they deserve.

Facebook tightens security further with new safety features

Facebook on Thursday morning unveiled new features aimed at making people feel more secure on the ever-growing social networking site, including “Trusted Friends” and “App Passwords.” These are just the latest in a series of major privacy changes Facebook has announced in recent months.

Security is the next killer app for Hadoop

The open-source, data-processing tool Hadoop is already popular for a variety of use cases that can benefit from clusters of machines churning through unstructured data — such as search engines and social-media analysis — and now it’s turning its attention to security data.

Today, security must be built from the inside out

The old days of securing information with virtual barbed-wire fences are over. Today, security aspects have to be incorporated into software applications from the ground floor to ensure safety. And whether an application is hosted in the cloud or on a native server is almost moot.

Groupon Log-In Bug Offers Access to Wrong User Account

Groupon is investigating the case of a Seattle man who was able to log into another user’s account using Facebook Connect. The issue could be an isolated incident or could suggest some larger sloppiness on the part of fast-growing Groupon.

Sen. Al Franken Wants Answers From Steve Jobs

Sen. Al Franken (D-Minn.) wants to know why Apple’s iPhone collects and stores device location data in an unencrypted file. Franken penned a two-page letter asking nine questions of Apple CEO Steve Jobs in response to yesterday’s news regarding the “consolidated.db” file.

Researcher: iPhone Location Data Already Used By Cops

The news that Apple devices keep a record of your movements has generated plenty of coverage. Now, however, one researcher says not only has the knowledge been public for some time, but it’s already being used by security researchers and law enforcement agents.

Apple Tracks and Logs iPhone and iPad Location Data in iOS 4

Developers Alasdair Allan and Pete Warden recently discovered that your iPhone or 3G-capable iPad has been regularly recording your device’s location since the introduction of iOS 4. All of the data regarding your device’s whereabouts during the past year is easily accessible using a simple app.

For Some, Amazon Takes the Cloud Out of Its Cloud

Amazon Web Services this morning announced dedicated EC2 instances for customers using AWS’s newly upgraded Virtual Private Cloud service. This is yet another example of AWS pushing the innovation envelope despite its customer lead, although Dedicated Instances are a bit pricier than some recent free tools.

Security Questions to Ask Before Engaging with Cloud Providers

The transition to cloud computing won’t realize its potential until more vendors and buyers fully understand security requirements in the cloud. By establishing basic security requirements early and discussing these five questions, companies can position projects for success and avoid common security-related issues.

Get Mac Anti-Theft App Hidden Free Until January

If you’re getting or giving a new MacBook during the next couple of days, then grab Mac app Hidden, which provides a number of theft prevention services. Now until January 2011, the app is free. All you need to do is register, download and install.

Are You Giving Away the Keys to Your Mobile Kingdom?

If I asked you for your Gmail login credentials, would you give them to me? Probably not, because those credentials are the keys to your email, and you don’t want me poking around. Unfortunately I’ll bet you have given them to other folks you don’t know.

Mac 101: User Accounts and Basic Security

While there are no true viruses for OS X, that doesn’t mean Macs are impenetrable. They’re still vulnerable to malware, spyware, spam and trojans. However, with just a few precautionary measures, your Mac can be more secure than most any other consumer technology out there.

Remember That DM on Twitter? So Do Your Apps

Do you know what kind of information your Twitter apps are collecting? According to Mike Champion, VP of engineering at app directory Oneforty, the way that Twitter handles user permissions means that you could be giving those apps access to plenty — including your private messages.

Haystack Plays With Fire, Gets Badly Burned

The creators of a software project called Haystack claimed their software would allow Iranian dissidents to surf the web anonymously by encrypting their activity and hiding it among other web traffic, but the project has been shut down after security analysts said these claims were false.

HP Buys ArcSight to Bring Security to the Cloud

Hewlett-Packard has agreed to buy security software maker ArcSightfor $1.5 billion in cash, as the computer giant tries to expand the range of services it offers corporate clients. ArcSight’s software is used by companies and governments to track and identify suspicious activity on corporate networks.

Are You Practicing Safe Mobile Downloads?

The stage is set for a grand freak-out whereby the security companies inform people that their smartphones are just like computers and thus vulnerable to attack — before pitching a product folks can buy in order to stave off said attacks. It worked for PCs.

Quick Tip: Obscure Your Address Book Data

With both the iPhone and Mac address book syncing to Google or MobileMe, your address book data can be hacked without access to your actual phone. It’s time to think twice about what you store in your address book.

How-To: Lock Your iPhone With Any Password

The latest version of Apple’s mobile operating system, iOS 4, has been with us for a number of weeks now, but did you know that one new addition to the OS is the ability to lock your phone with any password of your choice?

NuCaptcha Gives the Captcha Test An Animated Upgrade

For those seeking an alternative to the indecipherable text-based captchas that test your humanity and your patience, there’s a new video-based solution available. NuCaptcha allows sites and blogs to deflect spambots with an animated security check, with a higher success rate than the static versions.

Dangerous New Mac Spyware Making the Rounds

Luckily, it’s not often that we have to make announcements regarding dangerous malicious software for the Mac. But not often isn’t never, and right now there’s a nasty piece of spyware attacking Apple’s computer platform. It’s called OSX/OpinionSpy, and it piggybacks in on free screensaver software.

Panda Puts Antivirus Software in the Cloud

Antivirus software is important, but many available products can bog down machines with heavy memory and processor usage. Panda Security today announced…

Secure iPhone Browsing

If you’re a security nut, browsing at a public hotspot can be like showering in a public bathroom. You might have no…

Don’t Trust That Passcode

Ryan Naraine reported over at ZDNet Zero Day on a new iPhone vulnerability which lets anyone have full access to the majority…

iPhone & The Enterprise

By now, you’ve seen the announcement of the March 6th iPhone announcement (which better be more than discussing a future announcement since…

Samba Bug Leaves OS X Vulnerable

Crunchgear points out PCWorld’s article stating that a bug in Samba may open OS X up to hackers. Samba is the open…

Symbian sleeps with the enemy

The big news this morning in the wireless world, Symbian licensing Microsoft’s ActiveSync technology which allows Symbian-based products to interact better with…

Yo “3″ G

Mobile Monday: says Hutch’s 3G service “3” has signed up 2 million subscribers in Italy.