Skip to content

Mobile device security threats you should know about

For most purposes smartphones today are almost as powerful as computers. There are now more phones in the world than the number of computers. Phones are being used by people to check emails, browse web, make online payments, download games, take pictures, track location and much more. Along with these powerful features we should also…

Read More

Best approach to deploying a Mobile Device Management system

The company leadership has identified the need for a system to effectively manage mobile devices in your organization. As the best IT guy around here you have been given the mandate to roll-out the system. You obviously will start looking for solutions in the market that can solve the problem for you. But there are…

Read More

Understanding Windows Mobile Application Security Policies

Execution of programs on Windows Mobile devices depends on the application signatures and their permission levels. Devices can be configured to the following security settings. Security off Unsigned applications are allowed to run without any prompt and they can access privileged APIs, or protected areas of the registry and file system. One-tier prompt The device…

Read More

How Max recovered his lost mobile phone? (Complete Story)

Max left his office after a hard day at work. As soon as he got into a taxi outside the office, his phone started ringing. The call was from the boss who asked Max to immediately respond to an important client’s email. Max kept his Windows Mobile phone aside on the empty seat before taking…

Read More