News & Analysis as of

Smartphones Mobile Devices Today's Popular Updates

Womble Bond Dickinson

The Slow-Tech Movement in a High-Tech World: Mobile Phones

Womble Bond Dickinson on

Technological turnover is the process in which technology advancements renders previous iterations obsolete. Each innovation comes with new features, faster computing, and changes in user experience....more

Clark Hill PLC

Crafting "Bring Your Own Device" ("BYOD") Policies to Protect Your Company Data and Ensure Compliance with the Law

Clark Hill PLC on

It’s hard to believe that just over a decade ago, the modern touchscreen smartphone was first introduced. Amidst the “oos” and “ahs” of the crowd, Steve Jobs unveiled the revolutionary Apple iPhone on June 29, 2007. The...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #130 – Smartphones Targeted by Dark Caracal Attack

There is a global malware campaign that is targeting mobile devices across the world. It is called Dark Caracal, which is believed to be sourced in Beirut by the Lebanese General Security Directorate. ...more

K2 Integrity

Border Searches: Risks to Electronic Devices and Your Data

K2 Integrity on

U.S. citizens who travel internationally, especially corporate executives and high-net-worth individuals, must consider and navigate data security risks when crossing a border—whether into the United States or another...more

Robinson & Cole LLP

Data Privacy + Cybersecurity Insider - December 2017 #3

Robinson & Cole LLP on

Apple has pushed an update to iOS 11.2 to its users. Users should consider pushing any updates that are recommended by the manufacturer, as there is usually a reason behind the update, and many times it is to fix a...more

Robinson+Cole Data Privacy + Security Insider

Privacy Tip #103 – Smartphone Replacement Parts Subject to Hacking

You drop your smartphone and now there are a million cracks and you can hardly read your texts. Getting the screen replaced by the manufacturer of the phone is usually expensive and sometimes it is so expensive that it makes...more

Bass, Berry & Sims PLC

Privacy Perils: Don't "Play" Around with Some Google Apps

Bass, Berry & Sims PLC on

A group of researchers at the University of Michigan has discovered that hundreds of applications in Google Play, whose function is to turn Android phones into a server that allows the user to connect their phone directly to...more

Robinson+Cole Data Privacy + Security Insider

Smartphone Malware Up 400% in 2016

Here’s some more good news. Not really. According to a recent report by Nokia, malware infections against mobile devices were at an all- time high in 2016. Infections on smartphones rose almost 400 percent and...more

Robinson+Cole Data Privacy + Security Insider

Data Breach Involving CloudPets “Smart” Toys Raises Internet-of-Things Security Concerns

On February 27, 2017, news reports disclosed a major security breach involving Spiral Toys, the seller of the CloudPets brand of internet-connected stuffed animals. The Bluetooth-connected CloudPets toys allow users to...more

Perkins Coie

New Lawsuits Challenge Qualcomm’s Allegedly Anticompetitive Patent Practices

Perkins Coie on

The Federal Trade Commission filed suit last week in federal court against Qualcomm, Inc., following its investigation launched in September 2014. The FTC alleges that the semiconductor manufacturer illegally maintained a...more

Robins Kaplan LLP

Mobile Location Analytics: Changing the Game for Brick and Mortar Retail

Robins Kaplan LLP on

For brick-and-mortar retailers, smart phones have taken on an entirely new role in customers’ shopping experiences. A technology known as "mobile location analytics" ("MLA") or sometimes, "indoor analytics," gives brick and...more

Robinson+Cole Data Privacy + Security Insider

Google Mandates Full Disk Encryption

With the release of Android 6.0, code name Marshmallow, Google has mandated that OEMs (Original Equipment Manufacturers) enable full disk encryption. Google is requiring that the feature be enabled as part of the ‘out of box...more

McNees Wallace & Nurick LLC

Next on DOL’s Agenda: Mobile Device Use Outside Work Hours

It appears that the U.S. Department of Labor intends to remain busy through the rest of the summer. After releasing in June a Notice of Proposed Rulemaking seeking public comment on proposed changes to the Fair Labor...more

Blank Rome LLP

Pennsylvania Federal Court Holds that Envelope with Visible Bar Code That Could Be Scanned To Reveal Consumer’s Account Number May...

Blank Rome LLP on

Action Item: In light of this decision, debt collectors should avoid the use of account numbers and/or QR codes on envelopes or within the viewing area of clear plastic envelope windows. Revealing such information on...more

BakerHostetler

2014 Mobile Privacy and Security Trends and What to Look for in 2015

BakerHostetler on

Most analysts and commentators agree that 2014 was the year mobile reached a tipping point. With over 1 billion mobile smartphones in circulation, 2014 marked the first year that mobile Internet usage surpassed desktop use in...more

15 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide