celebrex max daily dose

Monthly Archives: August 2011

Mobile phone data help track populations during disasters

Public release date: 30-Aug-2011 [ | E-mail | Share ] Contact: Clare [email protected] 44-122-344-2834Public Library of Science Mobile phone positioning data can be used to monitor population movements during disasters and outbreaks, according to a study published in this week’s

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Look – my Android is being robbed!

Only this time, it’s not a guy with a mask and gun sprinting off down the back alley. No, this kind of attack takes place in broad daylight, following the installation of increasingly popular malicious apps. You may not even

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Android Devices Exposed: 7 Ways to Thwart Hackers

CIO — Take a deep breath. There’s a new report out highlighting a huge spike in threats against Google’s Android platform. Yes, it’s something to be concerned about. But don’t freak out or return your cool new Samsung Galaxy Tab.

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Android Malware Issues Rise : The Implications

New research from McAfee suggests that Android is the most attacked mobile OS, jumping 76 per cent in Q2 this year.  Clearly there is a correlation here with usage. As smartphones increase in popularity, it is a given that malware

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Mobile wallet wars: Bet on the established financial, billing players

When it comes to mobile wallets, the dream is that consumers will use smartphones as their primary payment mechanism. You tap. You pay. These wallets will be so handy that all of your cards—Visa, Amex, Mastercard and loyalty clubs—will be

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

8 Android threats BYOD users should know about

Sign up for our Newsletters |   Email the Editor  |  Print  The Android mobile operating and the BYOD (bring your own device) trend – a marriage made in heaven. For app-hungry users probably, but the combination could be malevolent

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

e-Cycle, CCMI and The Voice Report to Present a Free Webinar to Help Enterprises Avoid Wireless Mobile Data Security …

On September 13 at 2pm EST, e-Cycle LLC in collaboration with CCMI and The Voice Report, is hosting a free, in-depth webinar entitled “Build a Secure Mobile Lifecycle Program for Your Enterprise.” Guest authorities will explore emerging wireless data security

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Product news: Trend Micro announces Titanium V5

Internet security vendor, Trend Micro, has introduced a range of tools providing maximum security called the Titanium V5. It uses cloud technology to stop viruses, spyware and other threats before they reach a computer. It is designed to protect consumers

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Fake Anti-Virus, Social Network Scams On The Rise: Report

Users might be a little more wary of unsolicited offers for anti-virus software after a SonicWall report indicated that fake anti-virus scams sailed to the top of the list as the most pervasive form of malware during the first half

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,

Wyse PocketCloud Pro Creates Personal Mobile Cloud for Android, Windows

Wyse is introducing the concept of a personal cloud–a seamless connection between your mobile device and your PC–with the launch of the latest version of Wyse PocketCloud Pro for Android. The new PocketCloud Pro challenges file syncing and transfer services

Share
Posted in Mobile Security Tagged with: , , , , , , , , ,