Again On The Carrier IQ Saga

  • Post author:
  • Post last modified:December 13, 2011
  • Post category:MobileSecurity
  • Post comments:2 Comments
  • Reading time:5 mins read

Yesterday I posted evidence about the presence of the infamous Carrier IQ Software in Italy. Today another episode (I presume…

Continue Reading Again On The Carrier IQ Saga

The Dangerous Liaisons (Updated)

  • Post author:
  • Post last modified:August 22, 2011
  • Post category:Mobile
  • Post comments:1 Comment
  • Reading time:9 mins read

Did you know that a smartphone might involve as many as 250,000 patent claims? You may easily understand why the…

Continue Reading The Dangerous Liaisons (Updated)

Phonarchy in the U.K.

  • Post author:
  • Post last modified:July 15, 2011
  • Post category:MobileSecurity
  • Post comments:1 Comment
  • Reading time:5 mins read

It looks like that the Perfidious Albion is not what one should exactly define a Paradise for Mobile Security. Not…

Continue Reading Phonarchy in the U.K.

Home Made Mobile Warfare

  • Post author:
  • Post last modified:June 26, 2011
  • Post category:Mobile
  • Post comments:0 Comments
  • Reading time:3 mins read

David has shown me another example of the strict connection between real warfare and mobile warfare come from Afghanistan. Few…

Continue Reading Home Made Mobile Warfare