Estimated Reading Time: 7 minutes Much has been said in the last few days about the security of the Android platform in general and Google Wallet specifically. One frequent question that has been asked of the Google Wallet PIN vulnerability we found is “should the average consumer be concerned about mobile device exploits that require root privileges?” The unfortunate answer is “yes.” The reason is that while it is true that this PIN vulnerability requires root privileges to succeed, it does not require that the device be rooted previously.
Advanced data services for mobile service providers and subscriber analytics. The data-as-a-service model offers OEMs and companies a way to access data safely. Data analytics helps enterprises and business make effective decisions and support customer needs through analysis of user behavior. It also supports contextual targeting for mobile device advertising.
Estimated Reading Time: 8 minutes
Cell phone-based credit card payments are a burgeoning industry. There is a great deal of backroom negotiation going on today among players like Google, Verizon, AT&T and T-Mobile. They each want to establish themselves as a middleman in what they are betting will be a trillion dollar a year industry. The stakes are very high.
Identify and implement a solution that would provide safe Web Browsing protection from malicious and compromised websites for users of the Company’s flagship Mobile Security security offering. Additionally, provide parental…Details
Estimated Reading Time: 2 minutes The past weeks have been rife with accusations of privacy infringement against Apple for covertly collecting geo-location information from iPods, iPhones and iPads. Although the collecting of private information by mobile phone manufacturers and 3rd party apps is nothing new, the manner in which Apple stores its data has resulted in criticism from end-users and security experts alike.
Estimated Reading Time: 4 minutes
Growing instances of malware attacks on smartphones has sparked zveloLABS™ to compile the following quick guide to help users understand the ins-and-outs of jailbreaking smartphones, including what it is, insights into the legalities behind the process, how it’s done, and its benefits and risks.
Find a single vendor that had the technical competency and business flexibility to support web filtering solutions for the existing consumer-oriented user base, as well as provide a highly competitive premium offering for…Details