Microsoft's Outlook application for iOS and Android has security holes that are worrisome enough that enterprises should block the app altogether, an IBM developer says. Rene Winkelmeyer says he found sensitive information stored in the cloud and a vulnerability to malware through shared e-mail attachment services.
Technology blogger Amit Agarwal designed five steps for improving the online security of Google Apps after discovering his account had been hacked. Registering a phone number and a backup e-mail account, writing down account details and checking the IP address on your inbox can all improve security, he writes.
Terming it "the first credible challenge" to the iPhone, Time magazine has named Motorola's Android-powered Droid smartphone as the year's top gadget. Noted Time, "The Droid is a hefty beast, a metal behemoth, without the gloss and finish of the iPhone, but you don't miss it." Another Android model, HTC's Droid Eris, has received a software upgrade from Verizon Wireless designed to repair eight flaws, including SMS and MMS issues.
Many companies never invest in their IT human resources because they suffer from "shiny new penny syndrome," a condition that leads them to flit endlessly from one possible strategy to the next, according to consultant and DirecTV co-founding executive John McKee. Companies should build their IT strategy around developing talent, creating strong teams that can address complex problems, he writes, while implementing ways to track the return on their investment.
As the Federal Communications Commission works to formalize its Net neutrality rules, Internet service providers -- particularly AT&T -- are offering backhanded resistance, according to Bill Snyder. AT&T is lobbying in support of Sen. John McCain's proposed Internet Freedom Act, which would block the FCC regulations and which Snyder argues would allow AT&T to retain its "robber-baron" status as an Internet gatekeeper.