Authenticating Mobile Apps

Everyone is excited about the new Google phone – Nexus One. I am actually considering making the jump from iPhone to an Android-based phone. The Android Market is the Google’s answer to iTunes App store. In an interesting twist of events, a rogue app called...

5 Security Threats Expected in 2010

Is anyone really surprised that two of the top security threats expected in 2010 have to do with social engineering and mobile media? Hackers live in the same world we do, and they naturally gravitate toward any media that is widely used. As social networking becomes...

The Problem with Passwords

Zack Whittaker’s post on whether we still need usernames/passwords is fueling an interesting debate at ZDNet.  The premise is familiar  – everyone is tired of storing their hundreds of passwords in an Excel sheet or a password management app.  Wouldn’t it be...