What exactly happens to smartphones separated from their owners? To find out, Symantec “lost” 50 smart phones around New York City and remotely tracked them. Read on to see what happened to the phones.
Fifty phones were loaded with fake personal and corporate information, then left in public locations around New York City. Using remote software, Symantec researchers then tracked what exactly happened to the phones after they were released into the wild. Here are some of the stats from their white paper:
72% of the people who found a smartphone looked at the photos on the phone
43% opened banking/financial applications on the phone
57% looked at a list of saved logins/passwords
50% of the phones were returned
It’s safe to assume that someone who finds a phone will turn the phone on (whether they intend to return it or not) if for no other reason than to access the phone book to attempt to call the owner. What’s unsettling about their findings is that the finders, even among the benevolent ones that attempted to return the phones, combed through personal data on the phone accessing everything from photos to passwords to corporate data.
So what do the study authors recommend? While most of their recommendations are geared towards corporate users, it’s still wise to heed their suggestion to use a lock screen and have some sort of system in place (in advance!) for dealing with a lost phone (such as installing remote wipe software Android Lost or learning how to use the iPhone’s Remote Wipe feature). Hit up the link below to read the entire study.
The Symantec Smartphone Honey Stick Project
Yeah, you’re right, the title of this article should make you laugh, and with good reason: it should be easy to shut down your PC, right? Well, Windows 8 makes it a little more confusing. Here’s how to do it if you haven’t figured it out already.
Think you know the answer? Click through to see if you're right!
NASA is particularly precise when it comes to splicing wires; there’s a lot at stake when you’re sending people into space. Learn how to splice NASA style by checking out their guidelines for splicing wires of all shapes and sizes.
You’ve probably already been using hotkeys in Windows 7 and previous versions, so now that Windows 8 is out, all you need to learn are the new shortcut keys. Here are the important new keys in a short list that you can easily learn.
Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices such as game consoles, printers, Wi-Fi access points, computers, and routers to automatically discover each other and establish networking services for file sharing, streaming media, and other networked
A new feature in Windows Media Player 12, which is included with Windows 7, is being able to stream media over the web to other Windows 7 computers. Today we will take a look at how to set it up and what you need to begin.
The Trinity Desktop Environment is KDE 3, actively developed and updated. It’s ideal for KDE fans that never took to KDE 4 or anyone interested in what KDE was like.
We’re awash in new movies, books, television shows, albums, and other media. How do you dig through it all and find the media you’ll enjoy?
Google may still be the top search engine, but Bing is starting to stand on its own. Bing has many of the same search operators offered by Google, but it has a few tricks you won’t find elsewhere.
When you email someone a copy of your document or presentation and they don’t have a font installed, the font reverts to default. This can mess up the whole layout, and can be fixed by embedding fonts into your documents.