With extra time thanks to a delayed flight, I was catching up on security news when I stumbled upon Hacky Easter, a white-hat hacking competition. The competition involved 24 challenges requiring various hacking skills to crack. Stuck in the airport with time to kill, I figured I would give it a try.
Here are five things I learned from the competition that apply to mobile.
Know what your users are leaving behind
One of the Hacky Easter challenges was just a picture of a restaurant. To solve this challenge, you had to know that the picture was geotagged. Using those coordinates you would search for social media images taken at this location, and find one that had “accidentally” captured a secret message in its background
Convoluted? Yes. But your users might also be leaving digital breadcrumbs behind. Was that tweet sent from a potential acquisition or new customer office? How would your competitors use that information? Continue Reading »Tweet
Application security practitioners are embracing a new truth about application security: mobile apps require new protections beyond the use of traditional secure coding techniques. A new approach incorporating binary protection countermeasures is required to effectively prevent hackers from pirating or compromising the confidentiality and integrity of applications. Unprotected binary code results in a mobile app that can be analyzed, reverse-engineered, and modified by an adversary in a matter of minutes! As per a recent article, “Number of mobile malware samples is growing at a rapid clip, increasing by 20-fold in 2013 … It is trivial for an attacker to hijack a legitimate Android application, inject malware into it and redistribute it for consumption. There are now binder kits available that will allow an attacker to automatically inject malware into an existing application”.
Continue Reading »
Competition. It’s the driving force for markets, sports, academics – and innovation. And there’s nothing like a formal throw-down to get players to bring their A-game.
At Mobile World Congress 2014, IBM invited developers and entrepreneurs to pick up the gauntlet in the IBM Watson Mobile Developer challenge. This global competition encouraged competitors to submit ideas for mobile apps powered by Watson, a cognitive computing breakthrough. These apps will take advantage of Watson’s ability to understand the complexities of human language, “read” millions of pages of data in seconds and improve its performance by learning. Winners will receive design consulting and support from IBM experts to help develop their idea into a viable commercial app that puts the power of Watson in the palm of a user’s hand.
While much attention has been focused (rightfully so) on the brilliant innovators who will propose the apps, I’ve been thinking about the industries they’re going to shake up. Which industries will “win” this competition? Or, more broadly, which industries will be changed the most by mobile analytics?
Continue Reading »
There is a myth hunting me since my early days in the Mobile business. It is the myth of the channel – there is a lot of talk and reasoning out there in the business and academical world about digital channels, multichannels and omnichannels which connect enterprises intelligently with the customer. It sounds so easy – whenever a new, fundamental technology shift happens, a new channel can be attached into the enterprise infrastructure, and it’s done. No reason to worry about this new technology anymore. Such technology shifts have happened several times, be it call centers and the phone channel, the web channel or just recently the social and mobile channels. But my experience is that if enterprises strictly follow the channel approach they are likely to fail in fully exploiting business opportunities, or even worse, some of them extinct due to the loss of competitiveness in the new technology era. The simple reason is that “the channel” is the wrong analogy to describe the massive impact of fundamental technology shifts like web, social and mobile.
What is a channel? Continue Reading »Tweet
Attendees at Impact 2014 in Las Vegas, Nevada, will have plenty of opportunities to get their hands on the latest IBM products and technologies, especially mobile. There are actually two different kinds of labs being offered at the conference, which runs from April 27 to May 1: scheduled lab sessions, which run at specific times, and open labs, where you can drop in any time during the open lab hours and work on lab exercises at your own pace.
The scheduled lab sessions cover a wide range of topics, some of which are on cutting-edge technology. You can use the Impact Session Preview tool to find a scheduled lab session that interests you. Some of the mobile lab session topics include the following*:
Continue Reading »