Skip to main content

Home/ centreforelearning/ Group items tagged security

Rss Feed Group items tagged

bernard tan

Protect your smartphone - 0 views

  • If you have ever entertained that seemingly laughable thought of installing anti-virus software on your mobile phone, you are not alone.
  • A few months ago, Kaspersky Labs discovered two Trojan-SMS malware that masqueraded as media player apps for Android devices. Once installed, the malware can send premium SMSes costing US$6 ($7.70) each without the user's knowledge.
  • the money is still on computers, and cyber criminals follow the trail of money. The increasing number of people using smartphones is a factor, but not a big one yet. There are some banking services on mobile platforms, but the majority of consumers still use computers to access banking services
  • ...4 more annotations...
  • According to Kaspersky, closed platforms (iPhone, BlackBerry and the old Symbian) are more secure while open platforms (Android, Windows Mobile 6 Series and the new Symbian) are less so. This, Kaspersky explains, is because the level of security is inversely proportionate to the ease with which developers can build apps on it.
  • "The more secure a system is, the harder it is for development - both for the good guys and the bad guys," he said.
  • security and ease of app development are two sides of the same coin that have to be finely balanced in order for a mobile platform to succeed.
  • iPhone users face exactly the same problems, but unfortunately, Apple has a very strict regulation on the apps industry, and the SDK it gives to software companies doesn't let us develop what we need. (Thanks to Apple's efforts policing the platform) iPhone users face maybe fewer virus problems, but the threat with confidential data is still there - and it only takes one threat. Android may face more viruses, but at the same time, there will also be more solutions from us and our competitors
  •  
    Open source and Closed source mobile platform faces security issue. An open source platform may be more prone to malwares and viruses. Some factors we should consider in our context here in education to protecting confidential contents and issues while considering developing apps. for example we could risk all of our contacts information being stolen and end up being sold to some advertising spamming companies who spam you daily or watches your daily activities.
  •  
    I used to think open source platform was very good for development but now you can have different view if you think like a hacker. It will take at least a year or more before mobile security catch up.
casey ng

Security of Cloud-based Internet Storage - 1 views

  •  
    Sharing sensitive information on cloud storage could post potential risk -- Users also observed that prior to April 2011, Dropbox stated on its website that: "All files stored on Dropbox servers are encrypted (AES256) and are inaccessible without your account password." But after April 2011, it dropped the 2nd part and changed to: "All files stored on Dropbox servers are encrypted (AES 256)."
bernard tan

Swedish hotel replaces room keys with mobile phone -  Tech & Gadget - MSN CA - 1 views

  • STOCKHOLM - Visitors to a Stockholm hotel will be able to use mobile phones instead of keys to unlock the doors to their rooms.
  • Repeat visitors during a four-month trial will be able to check in through their phones before arrival and have their phones activated as "keys." They will then be able to skip the registration desk and unlock the door by holding the phone next to it.The short-range radio technology, known as Near Field Communication, is expected to be built into smart phones in the coming years. It is also envisioned for ticketing and card payments. Assa Abloy says it wanted to test the system before expanding it to other hotels, commercial buildings and homes.
  • But once people have the technology in their own phones, he said, it will save them time at check-in and improve security because the access credentials in a lost phone can be revoked remotely.
  •  
    interesting on how mobile technology is bringing us :)
Eveleen Er

Can Your Mobile Apps Be Trusted? [INFOGRAPHIC] - 0 views

  • a comprehensive rundown on mobile app security
Sally Loan

Who Owns Mobile Learning in Your Organization? by John Feser : Learning Solutions Magazine - 0 views

  • The reality is that developing mobile solutions, whether for learning or another purpose, requires a significant investment in technology and skills, either or both of which the current HR or learning department may not possess.
  • Given the ties mobile will have to the organization’s Web infrastructure, IT will want to have input to issues such as security, the devices involved, sharing of data, bandwidth, and customer support (who gets called when there is a problem), as well as a myriad of other issues.
  • First, be aware of the many groups that have a stake or interest in mobile development in general, not just mobile learning
Sally Loan

Thoughts on Flash - 1 views

  • Adobe claims that we are a closed system, and that Flash is open, but in fact the opposite is true.
  • The difference is striking: on an iPhone, for example, H.264 videos play for up to 10 hours, while videos decoded in software play for less than 5 hours before the battery is fully drained.
  • Symantec recently highlighted Flash for having one of the worst security records in 2009
  • ...7 more annotations...
  • Flash has not performed well on mobile devices
  • To achieve long battery life when playing video, mobile devices must decode the video in hardware; decoding it in software uses too much power.
  • Flash is a closed system.
  • Flash was designed for PCs using mice, not for touch screens using fingers. For example, many Flash websites rely on “rollovers”, which pop up menus or other elements when the mouse arrow hovers over a specific spot. Apple’s revolutionary multi-touch interface doesn’t use a mouse, and there is no concept of a rollover.
  • letting a third party layer of software come between the platform and the developer ultimately results in sub-standard apps and hinders the enhancement and progress of the platform.
  • Our motivation is simple – we want to provide the most advanced and innovative platform to our developers, and we want them to stand directly on the shoulders of this platform and create the best apps the world has ever seen. We want to continually enhance the platform so developers can create even more amazing, powerful, fun and useful applications.
  • But the mobile era is about low power devices, touch interfaces and open web standards – all areas where Flash falls short.
  •  
    According to steve the no. 1 reason Apple not supporting Flash is that it does not support multiple touch screen when most modern device is supporting.
  •  
    Adobe claims that we are a closed system, and that Flash is open, but in fact the opposite is true.
Sally Loan

Jambok - an informal learning solution for the enterprise tha - 0 views

shared by Sally Loan on 07 Jan 11 - Cached
  •  
    Go beyond formal training to embrace "teachable moments" and informal learning. It allows anyone in the organization to create, store, and share knowledge. With Jambok's advanced security features, you select who sees what content, enabling collaboration both inside and outside the organization
Kartini Ishak

Innovative Techniques To Simplify Sign-Ups and Log-Ins - Smashing Magazine - 2 views

  •  
    Useful ideas to using innovative techniques to make form-filling less of a hassle. Useful source for future! 
  •  
    Not just the future... the suggest would work now because they are user-friendly and secure! :)
bernard tan

Security issue with Dropbox - 1 views

  •  
    After reading this. I dont suggest you install dropbox or login dropbox at shared or non private computers. Please take note if you are using dropbox for important files.
yeuann

Don Norman's jnd.org / Designing the Infrastructure - 1 views

  • The infrastructure of our computer technology can be overwhelming. My computer's infrastructure gets more complex each year, and all this complexity requires attention. Upgrades and security modifications. The need to change passwords for many accounts, and the need to keep my list of passwords up to date, synchronized across all my computers. The need to reboot, defragment, do continual scans for viruses and malcontent software, the need to renew batteries and accounts. Backup files. It seems that every day I spend considerable time on the infrastructure. Because the ability to maintain infrastructure is seldom designed with care, each simple activity can become daunting. Each new device purchased requires installation, complete with registration, agreeing to unread but undoubtedly onerous legal conditions, and finding space and sockets for all the communication and power cable. Did I mention that these invariably require stopping all work, saving everything, and rebooting, after typing in a long, complex registration number? I should have.
  • Infrastructure is taken for granted. It is time it is given as much attention as the primary applications, else maintaining the infrastructure will itself become our primary activity.
  • It is time to work on infrastructure. It threatens to dominate our lives with ugliness, frustration, and work. We need to spend more time on the designs for infrastructure. We need to make it more attractive, more accessible, and easier to maintain. Infrastructure is intended to be hidden, to provide the foundation for everyday life. If we do not respond, it will dominate our lives, preventing us attending to our priory concerns and interests and instead, just keeping ahead of the maintenance demands.
  •  
    When I think about "infrastructure", I normally think about roads, wires, sewerage and so on. But how about educational technology and instructional design? From reading Don Norman's musings about infrastructure, I realized that if we want our technological implementations to be successfully adopted, very often it's essential to also consider the infrastructure needed to support our tech designs and implementations. Personally, I think infrastructure for education and instructional design need not always be physical things. They could be intangibles such as having to update a database, notify the relevant people in charge, call this person or that to come unlock the computer lab, etc. My mum's been a teacher for 40+ years. She's great. But she really hates the computer. Not because of the learning needed to use Microsoft Word. She's quite fine with it. But it's all the non-Microsoft Word things that she has to do - reboot, turn the computer on, manage the files, etc... - that makes her scream.  "It is time to work on infrastructure. It threatens to dominate our lives with ugliness, frustration, and work. We need to spend more time on the designs for infrastructure. We need to make it more attractive, more accessible, and easier to maintain. Infrastructure is intended to be hidden, to provide the foundation for everyday life. If we do not respond, it will dominate our lives, preventing us attending to our priory concerns and interests and instead, just keeping ahead of the maintenance demands." - Don Norman Food for thought: What are some underlying "infrastructure" (tangible and intangible) that I may encounter in an educational technology project? Are there existing infrastructure that I can take advantage of to minimize time and $? How can we minimize the amount of infrastructure maintenance needed?
1 - 19 of 19
Showing 20 items per page