Wednesday, February 9, 2011

Android Market poses security threats to customers

The newly opened online store of Google, the Android Market could pose serious security threats to its users and open a world of opportunities to the hackers. As per security firm Sophos, the instant download feature of the apps in the Android Market is vulnerable to malicious attacks from hackers.

The problem cited by Vanja Svajcer, Virus Researcher, Sophos in a blog post elaborates that as customers purchase apps, they get downloaded directly to their Android devices. So when this happens without the need of any customer approval for the software installation, it opens the device to anyone who can manage to steal the Google password of the customer.


This would lead to hackers duping you into installing software on your Android device without the need of your permission. The blog also added that as the apps are downloaded, these events happen in the background and customers won't be aware of the same.

As a measure to this, Sophos suggests Google to alter the procedure of instant app download and give customers the choice of approving the downloads. For the customers, the security firm recommends to have strong passwords which cannot be guessed easily.

Tuesday, February 8, 2011

Smartphones exploding thanks to Android: IDC

Smartphone growth is exploding around the world, as Google's open-source Android operating system drives prices down, according to a study released by market research firm IDC.

The study found that smartphone sales reached 101 million in the fourth quarter, up 87 percent from a year earlier. Smartphones sales for 2010 were 302 million, up 75 percent on the year.
Smartphones exploding thanks to Android: IDC


"Android continues to gain by leaps and bounds, helping to drive the smartphone market," said Ramon Llamas, an IDC analyst.

He called the Android operating system the "cornerstone" of the smartphone strategy for many vendors and the biggest challenger to Nokia's Symbian OS, the market leader.

Nokia was still the market leader with 33.1 percent, down from 39 percent the year earlier. Research in Motion, the maker of the Blackberry, also saw its share decline from 19.9 percent to 16.1 percent. Apple's share rose from 14.5 percent to 15.7 percent.

The most impressive gains were made by Samsung, whose Android-powered phones sold 23 million units compared to 5.5 million in 2009, more than doubling its market share to 7.6 percent. HTC also saw impressive gains, selling 21.5 million smartphones, up from 8.1 million in 2009, to increase its market share to 7.1 percent from 4.7 percent.

Thursday, January 6, 2011

India's cheapest Android phone coming from Intex























Intex is joining the Android bandwagon by releasing its first Android smartphone in February 2011. And this is not just the end of news. The smartphone from Intex will also be the cheapest Android phone to be available in the Indian market at 5,500.

Due to launch in the first week of February next year, the phone will be running on Android 2.2 (Froyo), complete with a 3.2MP camera, 2.8 inch resistive full-touch screen, Wi-Fi and GPS.


It should be noted that the Intex phone will be in competition with Micromax's Andro A60, launched earlier in the month. The Andro A60 however costs more at 6,999 and runs on Android 2.1. This will give an edge to the Intex phone when it releases.

While we don't have the full specs of the Intex phone at present, we will get all of that when the phone releases. We have to wait for the phone to release to see how the market reacts to it.

What's in store for the mobile market in 2011?

The mobile market is spiralling toward growth with each year. So with the new year approaching fast, here are the top 10 mobile market trend predictions by the Mobile Marketing Association for the year 2011 in the Asia Pacific region.

1. With evolving mobile technology, the messages on mobile marketing will turn more personalized. Introduction of regulations in the mobile marketing sphere can lead to greater business-to-consumer transactions, eliminating the spams involved in mobile advertising.
What's in store for the mobile market in 2011?


2. Over-the-top services will bring in revenues for value added services. Operators need to focus more on converged devices like tablets.

3. Applications allowing free SMS, video and phone calls will enter the market. Few like WhatsApp and Viber are already doing so. With more such applications, basic mobile features will be available for free, irrespective of the devices used.

4. With the introduction of the Windows 7, the focus is moving toward strict hardware specifications, along with Research In Motion (RIM) and Apple. This means that ads on these platforms will be counted as more credible, helping the cause of mobile marketing.

5. New apps are showing the way to mobile ads. The presence of an app without even a data connection, with high usability levels are making the cases of these kind of ads stronger. However, since apps are device specific, avenues for experimentation will be limited. This may lead to waning out of the popularity of apps itself.

6. The increase in GPS and digital compasses has led to a number of location based Augmented Reality (AR) software platforms and apps. The combination of location based services and AR allow for graphic content to be made in relation to the user's position. This case is a classic example of specific targeting in the ad world scenario promising to increase ad spend and transactions.

7. Mobiles becoming a means for payment of bills gives the advantage of quick transaction. It also ensures customers can purchase while on the go without the need of cash in hand. This promises a bright future for mobiles in future as a mode of transaction.

8. Mobiles are fast becoming replacements for computers, as they are turning more feature rich. With introduction of converged devices like tablets, consumers now have greater speed and battery life. These devices are fast becoming the choice of medium for writers/ bloggers, allowing them to edit and upload contents in various formats even while travelling.

9. Increasing number of handsets ship with browsing capabilities letting people to access Web on their mobiles. This paves a way for business-to-consumer applications to be delivered via phones. Smartphones are allowing consumers to view richer content on their mobile devices helping the marketers.

10. With 3D technology sweeping the mobile arena too, it will create space for innovation in mobile ads. The technology is definitely shape the future of mobile ad contents.

Skype launches Wi-Fi, 3G video calling to iPhone app

Skype is offering a new video calling application which will run on iPhone, iPad, and iPod Touch. The video calling works over both Wi-Fi and 3G.

With this new Skype 3.0 will enable free video calling to the Apple devices and the users will be able to use both Wi-Fi and AT&T's 3G cellular network. With this, users can activate any video chats from their contacts by turning on the video feature.

The app is compatible with iPhone 4, iPhone 3Gs, and the 4G iPod Touch with iOS 4.0 and above. It also offers free services such as voice or video calls to other Skype users. Users need to pay to make calls from a PC to a landline or cell phone.

As earlier, Skype remains to offer instant messaging, text messaging, audio-only chats, and the ability to call landlines and mobile phones at low rates.

It should be noted that Skype for iPhone is free and video calling needs iOS 4.0 or above. The application can be run on any device with at least iOS 3.0.

Tracking of lost laptops made easier with new tech

Quick Heal, an Internet security tools provider, has introduced a new technology called Laptop Tracker that helps to track and recover lost laptops. The technology works on the premise that every laptop or PC has a Media Access Control ID (MAC ID) - the physical address of the device. When the stolen devices are connected to the Internet, its IP location can be found using the physical address number.

To use the services of the Laptop Tracker technology, one needs to register into its website known as www.trackmylaptop.net. All one needs to do there is key in the physical address number of the laptop or PC.

The solution from the Pune-based company is open for everyone. However those of who are using its anti-virus solution do not have to fill the MAC IDs. The technology would help the cyber crime departments and law enforcement departments of the country and the company is in talks with them to deploy the technology.

Saturday, December 18, 2010

12 common mistakes done by programmers

Most often, software developers seem locked into certain failure modes that can't be avoided and such is the frequency with which they fall prey to a particular poor programming practice.Peter Wayner of Computerworld writes about twelve most common programming mistakes, each of which is accompanied by its opposing pair. Below are the twelve programming pitfalls developers should stay away from.
12 common mistakes done by programmers


Playing it fast and loose
Failing to prop up the basics is the easiest way to make errors in coding. There are a lot of small places where a developer may make a mistake which causes software to fail. And the worst part about sloppy programming is that advances in language design aimed to fix these problems don't do their job. There have been improvements in syntax in programming languages. For instance, the latest version of Java tries to make null-pointer checking easier by offering shorthand syntax for the endless pointer testing. But such syntax improvements can only prevent code from crashing. They don't eliminate the root of the problem: the proliferation of null values due to fast and loose programming.

Overcommitting to details
On the flip side, overly buttoned-up software can slow to a crawl. Relentless devotion to detail can even lock up software if the obsessive checking requires communicating with a distant website over the network. Here, the challenge is to design the layers of code to check the data when it first appears, which is much easier said than done.

Not simplifying control
Not simplifying control over tasks in their code may invite disaster for developers. The software assumes that if someone creates an object of type Name with two fields first and last, then it should immediately create a database table called Name with two columns, first and last. The names are specified in only one place, avoiding any problems that might come if someone fails to keep all of the layers of configuration in sync.

Delegating too much to frameworks
Sometimes the magic tools lead only to confusion. By abstracting functionality and assuming what we want, frameworks can all too often leave developers at a loss for what's gone wrong in their code. The rules are, while quite reasonable, not entirely trivial. As the app grows, it depends on more and more of these almost-trivial bits of external knowledge.

Trusting the client
Many of the worst security bugs appear when developers assume the client device will do the right thing. For example, code written to run in a browser can be rewritten by the browser to execute any arbitrary action. If the developer doesn't double-check all of the data coming back, anything can go wrong.

Not trusting the client enough
Sometimes too much security can lead paradoxically to gaping holes. Because of this, many Web developers are looking to reduce security as much as possible, not only to make it easy for people to engage with their products but also to save them the trouble of defending more than the minimum amount of data necessary to set up an account.

Relying too heavily on magic boxes
Many programmers assume they can link in the encryption library, push a button, and have iron-clad security. But many of these magic algorithms have subtle weaknesses, and avoiding these weaknesses requires learning more than what's in the Quick Start section of the manual.

Reinventing the wheel
Then again, writing your own libraries just because you think you know a better way to code can come back to haunt you. But grow-your-own cryptography is a welcome sight to attackers. Many libraries don't need to be perfect, so grabbing a magic box is more likely to be better than the code you write yourself.

Opening up too much to the user
Placing the onus on users to customize functionality they do not fully understand can invite disaster in the form of inadvertent security holes and privacy violations. When making purchasing decisions, most users can't handle the breadth of features offered by any given piece of software.

Overdetermining the user experience
Some developers decide to avoid the trouble of too many features by offering exactly one solution. But if users don't like the idea, they will look for ways to work around these limitations, and it will lead to an outcome that could translate into security vulnerabilities.

Closing the source
The decision to not distribute code works against the integrity of that code and it can discourage innovation and fixing bugs. Just opening up the code forces you to make the info more accessible, understandable, and thus better.

Assuming openness is a cure-all
While openness can make it possible for others to pitch in and, thus, improve your code, the mere fact that it's open won't do much unless there's another incentive for outside contributors to put in the work. Opening up a project can also add new overhead for communications and documentation. Moreover, a good open source project comes with extensive documentation of the API and road maps for future development.