smartphones

smartphones - News, Features, and Slideshows

Features

  • 2 easy ways to child-proof your Android or iOS device

    You know toddlers: The more expensive and precious an object is, the more likely they'll grab it. My 15-month-old daughter loves nothing better than to get her drooly little hands on my iPad--and when she does, she (naturally) skips the PBS Kids and Barney apps and makes a beeline for Safari and my Mail inbox. Great.

    Ben Patterson | 14 May | Read more

  • With Android L, Google makes pitch for enterprise users

    Google will provide enterprise-focused security and management features to its entire Android showcase of mobile devices, including features reserved only for Samsung devices running Samsung security software called Knox, a Google executive announced during the Google I/O keynote address Wednesday.

    Matt Hamblen | 26 Jun | Read more

  • How to use the new Android remote lock option

    Earlier in September, an update to the Google Settings app for Android tipped off that a remote device lock and password reset feature was on its way to the Android Device Manager. This week, the service finally went live for most users through the ADM Website.

    Ian Paul | 25 Sep | Read more

  • Tech Titans Talk: The IDG Enterprise Interview Series

    In the IDG Enterprise Interview Series, you'll hear from technology CIOs and CEOs on today's burgeoning trends, ongoing headaches and upcoming product plans. Check out this informative series from IDG Enterprise Chief Content Officer John Gallant and his team of editors.

    CIO | 17 May | Read more

  • 33 expert tips and tricks for iOS 6

    Perhaps you are already an iOS master. Or maybe you consider yourself more of a novice. Either way, we feel confident that at least some of the tips and tricks for iOS 6 that we present below will be new to you. What's more, we hope you love them--and benefit from them--as much as we do.

    Dan Moren and Lex Friedman | 07 Feb | Read more

  • 2012: The year in quotes

    Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.

    Nancy Weil | 12 Dec | Read more

  • Worst security snafus of 2012

    The first half of 2012 was pretty bad - from the embarrassing hack of a conversation between the FBI and Scotland Yard to a plethora of data breaches - and the second half wasn't much better, with events including Symantec's antivirus update mess and periodic attacks from hactivists at Anonymous.

    Ellen Messmer | 10 Dec | Read more

  • 2011's biggest security snafus

    Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.

    Ellen Messmer | 02 Dec | Read more

  • Apple iOS: Why it's the most secure OS, period

    In June 2007, Apple released the iPhone, and the device quickly took off to become a major brand in the smartphone market. Yet when the iPhone shipped, security on the mobile operating system was nearly nonexistent. Missing from the initial iOS (then called iPhone OS) were many of the security features that modern-day desktop software has as a matter of course, such as data-execution protection (DEP) and address-space layout randomization (ASLR). Apple's cachet lured security researchers to test the platform, and in less than a month, a trio had released details on the first vulnerability: an exploitable flaw in the mobile Safari browser.

    Robert Lemos | 06 Jun | Read more

  • Steps to secure your smartphone against data theft

    You may already know the basics of Internet security and keeping your personal data private while browsing the Web: Use a firewall, don't open attachments you aren't expecting, and never follow links from strangers. But what about your smartphone? The ease with which security researcher Georgia Weidman was able to infect Android phones with her custom botnet during the 2011 ShmooCon security conference suggests that anyone concerned about the privacy of the personal data stored on their smartphone should think twice before downloading dubious or otherwise untrustworthy apps.

    Alex Wawro | 05 Mar | Read more