Feeds

Google gears up for mobile security smackdown

Danger, Will Robinson!

Top three mobile application threats

Tired of spotty network performance interrupting your web service's performance and of navigating the maze that is mobile application development?

Google can help - just don't rely on the giant's Android mobile Software Development Kit (SDK) when it comes to building in security.

Google has released a version of the Google Gears browser extension targeting mobile browsers, which is a "fully functioning" port of Google Gears 0.2. Google Gears mobile potentially simplifies development of applications featuring offline capabilities by providing local processing and storage of application resources when the network is unavailable.

But you better not be using a Nokia handset, or playing sneaky games on your BlackBerry, or be flash enough to own an Apple iPhone. Google Gears for mobile can be used only with Microsoft's Internet Explorer on Windows Mobile 5 and 6.

Charles Wiles, Google mobile product manager, said Google Gears for mobile will be available for other mobile platforms with "capable" web browsers, as well as its fledgling Android mobile software platform.

Nokia, RIM and Apple are not members of Open Handset Alliance (OHA), which promotes Android. Neither is Microsoft, but IE remains the industry's largest browser in terms of market share.

Paranoid Android

In a sobering twist, meanwhile, it has emerged that Google's Android contains multiple security vulnerabilities that could see mobile devices taken over by hackers.

Core Security Technologies has issued an advisory warning of several vulnerabilities in Android's core libraries used for processing graphic content in commonly used formats.

According to Core, some vulnerabilities were introduced by the native Android code using the image formats or implementing new functionality, and also by the use of "outdated and vulnerable open source image processing libraries".

Google in reverse brain drain shock!

In an unusual twist, the Googleplex's legendary powers of sucking in staff from rivals has gone into reverse. Sheryl Sandberg, Google's vice president of global online sales and operations, has quit after six years to start work as chief operating officer for pimply-faced social network Facebook.

No doubt her presence will be used to help steady nerves of investors like Microsoft and advertisers such as Coca-Cola following the Beacon debacle.®

Seven Steps to Software Security

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.