Programmers Need to Work Hard to Protect Smart Phones and Tablet Operating Systems

It is completely amazing that there are now nearly half a million iPhone apps that you can download, yes, many are silly and ridiculous, but quite a few of them really solve problems for us all. They increase our productivity, give us instant information, and help us navigate in our high-tech digital age of mobility. That’s all good no doubt. Unfortunately many of these apps are spying on us, giving away information to advertisers, and who knows whom else?

The programmers of these apps need to work hard and they need to work to protect smart phone users and tablet users. These operating systems are vulnerable to cross-app manipulation, data feeding, and even malware, spyware, adware, and viruses. If we don’t do better with this in the present then we are asking for problems in the future. Indeed it’s already happening.

In fact there seems to be an App war going on in a smart phone or tablet near you. Each app is already vying for your time, and many of them are trying to invade your space, data, information, and meme. Let me explain.

There is a new App available for both Apple and Android which monitors all your other Apps and spies on them, telling you which information they are collecting and distributing in real-time. So, all those Apps which are spying on you, well now you have a tool to help you spy on them – completely turning the tables on the electronic spy game; Spy Vs. Spy!

The other day there was an interesting article in Physorg [dot] com titled “Malicious Programmers Focus on SmartPhones, Tablets” by Brandon Bailey (posted on May 4, 2011) – from The San Jose Mercury News San Jose, CA. – Distributed by McClatchy-Tribune Information Services. I’d like you to go now and look up that article online and then come back to this article and let’s talk about the challenges ahead for the good-guys, the programmers who are out to protect us from malware, cyber attacks, data breaches, and spyware.

Perhaps you are beginning to understand that your iPhone, smart phone, iPad, or tablet look-a-like is not keeping your safe. Now this may change in the very near future as users and consumers demand. If you have data on these devices but you don’t want to let out, it’s probably too late.

If these devices are to survive and thrive in the digital age of mobility, then programmers are going to have to work very hard to protect them because right now they are being exploited. It’s beginning to look like the good, bad, and the ugly out there on the WiFi, 3G and 4G Wireless network. Indeed I hope you will please consider all this and think on it.

SMS Spy – How SMS Spy Software Can Help Parents Monitor Their Teen’s Text Messages

According to a recent report, the average teenager sends more than 3,000 SMS messages per month. That’s more than six text messages per waking hour. As a parent, do you know what type of messages your kids are sending? Are they sending (or receiving) in appropriate messages?

With kids sending so many messages every waking hour, how can parents monitor these messages to look for signs of abuse or involvement in prohibited activities? Up until recently, if a parent wanted to monitor these messages, their only option was to look at their children’s cell phone and hope the messages have not been deleted. If the messages were deleted, parents had no reliable way to recover those messages, and therefore there was no way to find out what their kids are involved in.

The good news is now there is NOW a way for parents to monitor their children’s text messages by using a low-cost, and highly reliable text message monitoring solution called SMS spy software.


SMS spy software is a cell phone app that is installed directly into a cell phone that you want to monitor. Installation is done via the phone’s web browser, and once installed, the cell phone monitoring app becomes invisible to the cell phone user. As the SMS/text messages are sent or received, they are recorded and then sent to your secure online account that you set up when you purchase the monitoring software. Logs are generally sent in certain intervals (usually 10-15 minutes), but can be adjusted based on how often you want the logs updated. Once you log into your account, you’ll have access to all the messages sent/received on the phone.

This type of “spy phone software” is commonly used by suspicious spouses to read their partner’s SMS/text messages to look for signs of infidelity, or as a way for employers to maintain a log of employee to customer text message communication. However, with the recent boom of texting, parents are now rushing to purchase SMS spy software to monitor their children’s texts.


SMS spy software enables parents to monitor all incoming and outgoing text messages. Parents are able to read the entire messages, even if the messages are immediately deleted after being read. In addition to the message contents, you also get to see the time and date of when the message was sent/received, the direction of the message (incoming/outgoing), number, and the name associated to the number in their cell phone.

What makes this type of software so popular among parents, is they can access the recorded text messages from any internet connected device that has a web browser. This means parents can monitor their kids texts from home or work – with some SMS spy software having features that will alert parents when certain keywords are triggered.

In summary, SMS spy software has fast become a popular product for parents who want to monitor their children’s text messages. By using this software, parents are able to read all incoming and outgoing messages, and ensure their kids are not doing anything they are not supposed to be doing.


Are Our Apps Inappropriately Apt to Advanced Computer Attacks?

There have been in ever increasing number of attacks ever since all of the apps became available for the smart phones and tablets. I expect this to increase, and until the directories which allow these apps in their libraries for download start enforcing some of the code within these apps, I imagine we will have more of the same for a good time to come.

There was an interesting article recently in our local paper here in Palm Desert, The Palm Desert – Desert Sun on July 10, 2011 titled “Media Apps Raise Privacy Concerns” by Byron Acohido (republished from the USA Today). The article stated what I believe we had all feared;

“Social Media Apps have introduced unprecedented risks, now being discussed as part of a push for stronger federal privacy laws. The Problem: Anyone can introduce a social-media app that ties directly into FaceBook, Twitter, Foursquare, and other popular services designed primarily to sell advertising, states the Online Trust Alliance.”

When it comes to apps, most people are more concerned that the apps are spying on them and giving away their location to advertisers, apparently some of the apps are spying on them, through spyware and code written into the apps, and they’re interested in a lot more than just advertising, and hope to garner a lot more information from the users than merely their location. In fact, a few of them were written by cyber hackers, and are looking for banking information, passwords, and other things.

Could it be that many of the recent break-ins to some of these very sophisticated IT departments of some of the top corporations in America are because the apps were spying on the users, and collecting their information including passwords, and then they were able to break into these systems very easily? And consider this, when people use their tablet or smart phone who’s to say that other people aren’t looking in with their on the Wi-Fi system?

The article in the USA Today, and my local paper here brings up a very good point. Maybe people are just far too trusting of these apps, and the data which is being disseminated from their tablets and smart phones. Now then, why is everyone so trusting of these new systems? Is it because they just assume that if they download something from the Apple App Store, or Google’s library of apps that it’s automatically safe and checked?

Do the users simply assume that those programmers which make them or the company they’re doing business with are legitimate, and would never use their data for anything other than what they promised? If so you can see the problem, we have far too many people that put far too much trust in their mobile apps. Indeed I hope you will please consider all this and think on it.