<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Mobile</title> <atom:link href="https://www.iphere.com/tag/mobile/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Report: Huge spike in mobile malware targets Android, especially mobile payments</title><link>https://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments</link> <comments>https://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments#comments</comments> <pubDate>Tue, 07 Oct 2014 14:13:12 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Android]]></category> <category><![CDATA[especially]]></category> <category><![CDATA[Huge]]></category> <category><![CDATA[Malware]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[payments]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Spike]]></category> <category><![CDATA[Targets]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments</guid> <description><![CDATA[Two very predictable traits drive cybercriminals: First, they tend to focus on targets with the highest odds of success. Second, they prefer attacks that generate profit. A new joint report from Kaspersky Lab and INTERPOL underscores how these two factors contribute to concerning trends in mobile threats.  The Mobile Cyber Threats report analyzes mobile malware [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-huge-spike-in-mobile-malware-targets-android-especially-mobile-payments/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Report: Businesses at risk from unreported mobile device theft</title><link>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft</link> <comments>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft#comments</comments> <pubDate>Thu, 04 Sep 2014 14:13:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Businesses]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[from]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Theft]]></category> <category><![CDATA[unreported]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft</guid> <description><![CDATA[Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported. Kaspersky Lab surveyed [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Study: Concern over mobile device theft on the rise</title><link>https://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise</link> <comments>https://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise#comments</comments> <pubDate>Fri, 20 Jun 2014 02:13:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Concern]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Over]]></category> <category><![CDATA[Rise]]></category> <category><![CDATA[Study]]></category> <category><![CDATA[Theft]]></category> <guid
isPermaLink="false">http://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise</guid> <description><![CDATA[Have you ever had a smartphone or tablet stolen? The devices&#8217; size and portability makes them prime targets for criminals, and there is a rising trend of people being mugged for their mobile devices. A new study found that consumers are increasingly concerned with the risk of having a mobile device stolen. In the study [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Brandpost: Report: Phishing scams increasingly using mobile apps to bait victims</title><link>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims</link> <comments>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims#comments</comments> <pubDate>Wed, 07 May 2014 20:17:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Apps]]></category> <category><![CDATA[bait]]></category> <category><![CDATA[Brandpost]]></category> <category><![CDATA[increasingly]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Phishing]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[scams]]></category> <category><![CDATA[Using]]></category> <category><![CDATA[victims]]></category> <guid
isPermaLink="false">http://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims</guid> <description><![CDATA[When it comes down to it, spam and phishing scams rely primarily on exploiting trust. If the attacker can find a way to make the message appear to be from a known source, the odds that a user will take the bait are much higher. This has led to malware infections that access your contacts [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>The New Mobile Enterprise: A Smorgasbord Of Choices</title><link>https://www.iphere.com/the-new-mobile-enterprise-a-smorgasbord-of-choices</link> <comments>https://www.iphere.com/the-new-mobile-enterprise-a-smorgasbord-of-choices#comments</comments> <pubDate>Wed, 26 Feb 2014 20:13:41 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Choices]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Smorgasbord]]></category> <guid
isPermaLink="false">http://www.iphere.com/the-new-mobile-enterprise-a-smorgasbord-of-choices</guid> <description><![CDATA[As wireless technologies take precedence in the enterprise, WLANs have become complex deployments. Here&#8217;s a look at the evolving array of wireless options. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/the-new-mobile-enterprise-a-smorgasbord-of-choices/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Lookout study: hackers target mobile attacks by region</title><link>https://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region</link> <comments>https://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region#comments</comments> <pubDate>Sat, 22 Feb 2014 02:17:25 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Attacks]]></category> <category><![CDATA[Hackers]]></category> <category><![CDATA[Lookout]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[region]]></category> <category><![CDATA[Study]]></category> <category><![CDATA[Target]]></category> <guid
isPermaLink="false">http://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region</guid> <description><![CDATA[Mobile devices are prime targets for for cyber criminals, and a report by mobile security company Lookout reveals some surprising data about how they plot their attacks. Lookout collected data from more than 50 million users between January and December of 2013. It analyzed the information and broke it down by region and type of attack to get [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/lookout-study-hackers-target-mobile-attacks-by-region/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>ONF Ramps Up Wireless And Mobile SDN Effort</title><link>https://www.iphere.com/onf-ramps-up-wireless-and-mobile-sdn-effort</link> <comments>https://www.iphere.com/onf-ramps-up-wireless-and-mobile-sdn-effort#comments</comments> <pubDate>Thu, 23 Jan 2014 02:13:16 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Effort]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Ramps]]></category> <category><![CDATA[Wireless]]></category> <guid
isPermaLink="false">http://www.iphere.com/onf-ramps-up-wireless-and-mobile-sdn-effort</guid> <description><![CDATA[The Open Networking Foundation&#8217;s new working group is focused on extending OpenFlow to wireless and mobile networks. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/onf-ramps-up-wireless-and-mobile-sdn-effort/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Small Cells: Should Mobile Customers Foot The Bill?</title><link>https://www.iphere.com/small-cells-should-mobile-customers-foot-the-bill</link> <comments>https://www.iphere.com/small-cells-should-mobile-customers-foot-the-bill#comments</comments> <pubDate>Mon, 09 Dec 2013 20:12:46 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bill]]></category> <category><![CDATA[Cells]]></category> <category><![CDATA[Customers]]></category> <category><![CDATA[Foot]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Should]]></category> <category><![CDATA[Small]]></category> <guid
isPermaLink="false">http://www.iphere.com/small-cells-should-mobile-customers-foot-the-bill</guid> <description><![CDATA[The small cell market is growing fast as a solution for fixing mobile network shortcomings, but should end users pay for small cells instead of carriers? Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/small-cells-should-mobile-customers-foot-the-bill/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Study finds most mobile apps put your security and privacy at risk</title><link>https://www.iphere.com/study-finds-most-mobile-apps-put-your-security-and-privacy-at-risk</link> <comments>https://www.iphere.com/study-finds-most-mobile-apps-put-your-security-and-privacy-at-risk#comments</comments> <pubDate>Fri, 06 Dec 2013 02:13:28 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Apps]]></category> <category><![CDATA[Finds]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Most]]></category> <category><![CDATA[Privacy]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Study]]></category> <guid
isPermaLink="false">http://www.iphere.com/study-finds-most-mobile-apps-put-your-security-and-privacy-at-risk</guid> <description><![CDATA[The average smartphone user has 26 apps installed. If recent research conducted by HP is any indication, approximately, well, all of them, come with privacy or security concerns of some sort. The HP study focused purely on custom business apps, but there&#8217;s no reason to believe the issue doesn&#8217;t extend to commercial apps you find in the [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/study-finds-most-mobile-apps-put-your-security-and-privacy-at-risk/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Why mobile and cloud will converge to become Mobile Cloud</title><link>https://www.iphere.com/why-mobile-and-cloud-will-converge-to-become-mobile-cloud</link> <comments>https://www.iphere.com/why-mobile-and-cloud-will-converge-to-become-mobile-cloud#comments</comments> <pubDate>Wed, 27 Nov 2013 20:18:24 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Become]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[converge]]></category> <category><![CDATA[Mobile]]></category> <guid
isPermaLink="false">http://www.iphere.com/why-mobile-and-cloud-will-converge-to-become-mobile-cloud</guid> <description><![CDATA[Everything’s coming up mobile these days. Gartner estimates that PC sales will make up only about 13 percent of device sales in 2013—and some undisclosed portion of those PCs are notebooks. The more we rely on small, mobile devices to get things done, the more we also depend on cloud storage and services to extend [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/why-mobile-and-cloud-will-converge-to-become-mobile-cloud/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>