Paying with our privacy
Mark Bridge writes:
There’s been a lot of talk recently about PRISM, which may allow the US National Security Agency - and anyone they choose - to access some of our personal online information if it passes through the USA. It’s unclear exactly what (if anything) is being shared with whom… and given the nature of national security, we may never know.
However, alongside the possibility of governments seeing information we thought was secure, it’s also worth pointing out that we choose to share plenty of online information ourselves.
Thrills for Tesco customers, chills for Android users
Mark Bridge writes:
As Mobile World Congress 2013 disappears behind us, so the frenzy of news releases about new products and services returns to relatively normal levels.
Satish Shetty of Codeproof Technologies writes:
Don’t underestimate the security of your smartphone. Here are 4 important but easy security tips to secure your iPhone, iPad, Android phone and Tablet devices.
How Mobile Apps are changing the way the military operates in the field
Kevin Deal, Vice President of Aerospace & Defence at IFS North America, writes:
It is difficult to believe that the idea of a hand-held mobile phone was an alien concept only a few short decades ago. From brick-sized analogue devices to wafer thin smartphones with processing capabilities comparable to those of laptops, new technology is constantly pushing the boundaries of what we can expect from our phones. And, in a reverse of the normal pattern of technology innovation, a development driven by consumers is set to have an important impact on aerospace and defence (A&D).
Gabe Joselow of voanews.com writes:
Mobile phone subscribers in Kenya may wake up Monday morning to find their phones no longer work, as the nation's telecom companies enact a nation-wide switch-off of all counterfeit devices. Retailers and customers have mixed reactions to the plan, which could affect up to three million mobile phones.