Feeds

Google gears up for mobile security smackdown

Danger, Will Robinson!

Remote control for virtualized desktops

Tired of spotty network performance interrupting your web service's performance and of navigating the maze that is mobile application development?

Google can help - just don't rely on the giant's Android mobile Software Development Kit (SDK) when it comes to building in security.

Google has released a version of the Google Gears browser extension targeting mobile browsers, which is a "fully functioning" port of Google Gears 0.2. Google Gears mobile potentially simplifies development of applications featuring offline capabilities by providing local processing and storage of application resources when the network is unavailable.

But you better not be using a Nokia handset, or playing sneaky games on your BlackBerry, or be flash enough to own an Apple iPhone. Google Gears for mobile can be used only with Microsoft's Internet Explorer on Windows Mobile 5 and 6.

Charles Wiles, Google mobile product manager, said Google Gears for mobile will be available for other mobile platforms with "capable" web browsers, as well as its fledgling Android mobile software platform.

Nokia, RIM and Apple are not members of Open Handset Alliance (OHA), which promotes Android. Neither is Microsoft, but IE remains the industry's largest browser in terms of market share.

Paranoid Android

In a sobering twist, meanwhile, it has emerged that Google's Android contains multiple security vulnerabilities that could see mobile devices taken over by hackers.

Core Security Technologies has issued an advisory warning of several vulnerabilities in Android's core libraries used for processing graphic content in commonly used formats.

According to Core, some vulnerabilities were introduced by the native Android code using the image formats or implementing new functionality, and also by the use of "outdated and vulnerable open source image processing libraries".

Google in reverse brain drain shock!

In an unusual twist, the Googleplex's legendary powers of sucking in staff from rivals has gone into reverse. Sheryl Sandberg, Google's vice president of global online sales and operations, has quit after six years to start work as chief operating officer for pimply-faced social network Facebook.

No doubt her presence will be used to help steady nerves of investors like Microsoft and advertisers such as Coca-Cola following the Beacon debacle.®

Beginner's guide to SSL certificates

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.