Feeds

Google gears up for mobile security smackdown

Danger, Will Robinson!

A new approach to endpoint data protection

Tired of spotty network performance interrupting your web service's performance and of navigating the maze that is mobile application development?

Google can help - just don't rely on the giant's Android mobile Software Development Kit (SDK) when it comes to building in security.

Google has released a version of the Google Gears browser extension targeting mobile browsers, which is a "fully functioning" port of Google Gears 0.2. Google Gears mobile potentially simplifies development of applications featuring offline capabilities by providing local processing and storage of application resources when the network is unavailable.

But you better not be using a Nokia handset, or playing sneaky games on your BlackBerry, or be flash enough to own an Apple iPhone. Google Gears for mobile can be used only with Microsoft's Internet Explorer on Windows Mobile 5 and 6.

Charles Wiles, Google mobile product manager, said Google Gears for mobile will be available for other mobile platforms with "capable" web browsers, as well as its fledgling Android mobile software platform.

Nokia, RIM and Apple are not members of Open Handset Alliance (OHA), which promotes Android. Neither is Microsoft, but IE remains the industry's largest browser in terms of market share.

Paranoid Android

In a sobering twist, meanwhile, it has emerged that Google's Android contains multiple security vulnerabilities that could see mobile devices taken over by hackers.

Core Security Technologies has issued an advisory warning of several vulnerabilities in Android's core libraries used for processing graphic content in commonly used formats.

According to Core, some vulnerabilities were introduced by the native Android code using the image formats or implementing new functionality, and also by the use of "outdated and vulnerable open source image processing libraries".

Google in reverse brain drain shock!

In an unusual twist, the Googleplex's legendary powers of sucking in staff from rivals has gone into reverse. Sheryl Sandberg, Google's vice president of global online sales and operations, has quit after six years to start work as chief operating officer for pimply-faced social network Facebook.

No doubt her presence will be used to help steady nerves of investors like Microsoft and advertisers such as Coca-Cola following the Beacon debacle.®

7 Elements of Radically Simple OS Migration

More from The Register

next story
PEAK LANDFILL: Why tablet gloom is good news for Windows users
Sinofsky's hybrid strategy looks dafter than ever
Leaked Windows Phone 8.1 Update specs tease details of Nokia's next mobes
New screen sizes, dual SIMs, voice over LTE, and more
Fiendishly complex password app extension ships for iOS 8
Just slip it in, won't hurt a bit, 1Password makers urge devs
Mozilla keeps its Beard, hopes anti-gay marriage troubles are now over
Plenty on new CEO's todo list – starting with Firefox's slipping grasp
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
Another day, another Firefox: Version 31 is upon us ALREADY
Web devs, Mozilla really wants you to like this one
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Cloudy CoreOS Linux distro declares itself production-ready
Lightweight, container-happy Linux gets first Stable release
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?