Feeds

How Google and Apple exposed their Achilles heels this week

Mobile payments and advertising are rocky ground for the big boys

Top three mobile application threats

Analysis In the massive tussle between Apple and Google, it is easy to forget that neither giant (for all their successes) is infallible. They are almost unbeatable in their core markets – Apple in device design and user experience, Google in search, advertising and online software.

But once they venture out of their comfort zones, disaster can ensue, exposing Achilles heels for rivals to exploit. Both have stumbled multiple times in the TV market, and this week highlighted the risks both take to their precious brands when they get too power hungry and seek to extend their control over too many elements of the web ecosystem.

Google Wallet snafu

Google pulled prepaid cards supporting its Wallet payments platform temporarily but long enough to raise serious doubts over the initiative. Meanwhile, Apple was making desperate concessions to try to rescue its troubled iAd mobile advertising system.

Google was forced to disable the prepaid cards for its new Google Wallet payments system last weekend, following discovery of a major security hole. The search giant wants to kickstart adoption of NFC-based mobile payments by including Wallet in Android handsets in the US, and to ensure that platform vendors, rather than operators, have the upper hand in mobile commerce.

However, last week's intense attention to the security flaw in the software has been a setback, and Osama Bedier, VP of Google Wallet and Payments, acknowledged on a company blog that the prepaid cards were being pulled temporarily.

These cards allow users to upload money from credit cards to the virtual wallet on their phone, but Bedier said Google needed to "address an issue that could have allowed unauthorised use of an existing prepaid card balance if someone recovered a lost phone without a screen lock". He insisted the weekend's action was just "a precaution until we issue a permanent fix soon".

The hole came to light when blogger The Smartphone Champ outlined how a hacker could easily access a pre-paid card, which is connected to the user's device directly rather than a Google account. Crooks could therefore steal a phone and clear the data in the Wallet app, then log back in, at which point they would be prompted to enter a new PIN and Google account password. That would give them access to the card details and cash uploaded by the original owner.

Despite this, Bedier argued that Wallet remained a safe way to purchase goods, and better than "the plastic cards and folded wallets in use today". The app currently works on the Nexus S 4G device on Sprint's network and should come to other models and networks in the near future.

The whole incident aroused speculation that Wallet would prove to be another failed Google project, the latest in a string of experiments with hot markets where the search giant saw an opportunity to extend its influence – but was unable to deliver the required technology. There was a cull of such projects – including Google Labs, Google Health and Google PowerMeter – when Larry Page took the helm as CEO, vowing to "put more wood behind fewer arrows".

Wallet is closer to market than those, and is unlikely to go away altogether, at least unless it clearly loses the market to a rival. Any perceived security risks are the kiss of death to systems which involve users' money, but even before the recent problem, Wallet has not grabbed the support Google would have hoped for.

Verizon Wireless deactivated Wallet when it launched the latest Nexus smartphone, officially while it tested the capability – but many pointed to conflicts with the carrier's own participation in the Isis mobile payments initiative.

Six months after launch, Sprint remains the only carrier partner for Wallet and there are no signs of international plans. This issue is not unique to Google – all big NFC-driven plans have come up against retailer caution and consumer lethargy, which in turn has made the handset makers lukewarm about adding the pay-by-wave chips to their devices. The day of wireless NFC mobile payments is still a year or so away, and the question is whether Google will have the staying power to keep Wallet in the game until that day arrives.

Build a business case: developing custom apps

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Chips are down at Broadcom: Thousands of workers laid off
Cellphone baseband device biz shuttered
Twitch rich as Google flicks $1bn hitch switch, claims snitch
Gameplay streaming biz and search king refuse to deny fresh gobble rumors
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.