GPRS connections easily tapped
http://www.h-online.com/security/news/item/GPRS-connections-easily-tapped-1321018.html

If anyones looking for a good light free av for there smartphones other than DR WEB there is Lookout Mobile Security https://www.mylookout.com/


Zoho Invoice for iPhone

Available as a free download from the Apple iTunes App Store, Zoho Invoice ties into your (necessary, but free) Zoho online account. From your iPhone, you’re now able to create customer contacts, work estimates, sale items, service items and expenses with just a few clicks. A few more clicks, and the invoice or estimate is automatically synchronized with your account on Zoho’s servers, and you can immediately email a PDF version of what you’ve created to your customer.

http://www.crn.com/blogs-op-ed/the-daily-app/231400174/the-daily-app-zoho-invoice-for-iphone.htm



Your smartphone: a new frontier for hackers

Last week, security researchers uncovered yet another strain of malicious software aimed at smartphones that run Google's popular Android operating system. The application not only logs details about incoming and outgoing phone calls, it also records those calls.

http://www.seattlepi.com/news/article/Your-smartphone-a-new-frontier-for-hackers-1751887.php


Mobile VPN: staying secure on the go
http://www.h-online.com/security/features/Mobile-VPN-staying-secure-on-the-go-1259471.html

SSL patch for jailbroken iPhones
http://www.h-online.com/security/news/item/SSL-patch-for-jailbroken-iPhones-1324729.html

[b]Beware of Juice-Jacking[/b]

You’re out and about, and your smartphone’s battery is about to die. Maybe you’re at an airport, hotel, or shopping mall. You don’t have the power cable needed to charge the device, but you do have a USB cord that can supply the needed juice. Then you spot an oasis: A free charging kiosk. Do you hesitate before connecting your phone to this unknown device that could be configured to read most of the data on your phone, and perhaps even upload malware?


http://krebsonsecurity.com/2011/08/beware-of-juice-jacking/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+KrebsOnSecurity+(Krebs+on+Security)

Web OS to be discontinued :o
http://news.cnet.com/8301-1035_3-20094232-94/webos-goes-down-in-quiet-death/

It will probably wind up as Open Source and find a little corner there. :slight_smile:

Accelerometer used to log smartphone keystrokes
http://www.h-online.com/security/news/item/Accelerometer-used-to-log-smartphone-keystrokes-1326303.html


Samsung Mobile Print for iPhone

Printing has remained one kludgey, undeveloped area in the tablet and smartphone space. There are too few apps available to enable printing from phones or tablets, even though they are the fastest-growing segment in the client computing space.

But some manufacturers are beginning to bring better printing technology to the table in the mobile world, and Samsung has developed a truly simple-yet-elegant app that marries mobile devices to its lineup of wireless-enabled printers.

http://www.crn.com/blogs-op-ed/the-daily-app/231500331/the-daily-app-samsung-mobile-print-for-iphone.htm



Hackers Unlock, Start Subaru Outback With Cell Phone

The demonstration was done at the Black Hat convention, which is a meeting of computer security professionals that takes places in Las Vegas.

According to an article published by SC Magazine, Don Bailey and Matthew Solnik employed a technique they call “war texting,” which allowed them to setup a Global System for Mobile Communications (GSM) network that could intercept the messages being sent between the Subaru Outback test car and the server that controls its software updates and other remotely-transmitted information.

http://www.autobytel.com/subaru/news/hackers-unlock-start-subaru-outback-with-cell-phone-102620/



Banking by smartphone can be risky

While security products that protect computers have been around for years, mobile security software products have just started to roll out. Less than one out of 20 mobile phone users worldwide have security software installed in them, according to Juniper Research.

Companies that provide (security) software for computer threats are now recognizing that mobile apps and mobile technology is increasingly an environment open to risks.

http://www.contracostatimes.com/news/ci_18712640


Android users hit by lethal Trojan root hack
http://www.macworld.co.uk/digitallifestyle/news/index.cfm?newsid=3298649&pagtype=allchandate


Dropbox for iPhone

Dropbox is one of the better-known, online storage services – along with Box.net and others – and among the reasons for its popularity is its drop-dead-easy setup and navigation. Begun as a browser-based service on the web, the iPhone app is just as simple.

http://www.crn.com/blogs-op-ed/the-daily-app/231600827/the-daily-app-dropbox-for-iphone.htm


AVG gets stung, app removed from WPM

http://www.winrumors.com/microsoft-pulls-avg-antivirus-windows-phone-app-from-the-marketplace/
http://www.withinwindows.com/2011/09/07/the-only-time-youll-see-avg-security-suite-warn-you-about-malware-on-windows-phone-7/
http://news.cnet.com/8301-10805_3-20103894-75/microsoft-removes-avg-app-from-windows-phone-marketplace/

Seven reasons to like BlackBerry 7 OS
http://www.sync-blog.com/sync/2011/09/seven-reasons-to-like-blackberry-7-os.html

Microsoft removes anti-virus app from Windows Phone marketplace
http://www.h-online.com/security/news/item/Microsoft-removes-anti-virus-app-from-Windows-Phone-marketplace-1341231.html

I would not want AVG on my Windows 7 phone

Microsoft has removed the AVG Mobilation for Windows Phone 7 virus scanner from its marketplace as doubts had been raised about its functionality and compliance with data protection regulations. By default, GPS tracking is active, so the user’s location is sent to AVG’s server with a unique ID. While an app that is partly designed to allow users to find a lost mobile phone would be expected to provide such a function, former Microsoft employee Justin Angel tweets that he is still concerned.

First SpyEye Attack on Android Mobile Platform now in the Wild
http://www.trusteer.com/blog/first-spyeye-attack-android-mobile-platform-now-wild