Investment in Mobile Security to Increase 44% Annually Through 2015

by , on

Regular followers of Callpod’s blog know that this has been an extraordinary year in mobile device security. Breaches of security are occurring at rates that only continue to accelerate. Hacking is taking place for all kinds of reasons as our lives become increasingly enmeshed in technology, targeting everyone from workers to regular consumers accustomed to shopping through online merchants and banking through the internet, to leaders of corporations and governments.

One thing that we can all admit after experiencing a year in which reports of mobile device security breaches have amplified is that there is a now a greater need than ever for protection from hackers. Most people now fall into the category of having something to protect- from contact lists, photos and files to passwords and login information, the value of the information that we carry is inestimable. Software developers are beginning to scramble to in response to the need to keep up with the new demand for protection from malicious users. Canalys recently reported that “investment in mobile security will increase 44% annually through 2015“.

Our product, Keeper Password and Data Vault™ provides a simple solution to the anxiety that can be felt over the perceived lack of control that you as a consumer may feel over the data and personal resources that are stored in your mobile device.

Keeper encrypts your data with military grade encryption that has met the criteria of approval for security software by the U.S. Department of Homeland Security. In the context of our software, this encryption is egalitarian and unbiased- our software has no agenda other than to protect anyone who uses it. No one can crack the code to the encryption of the files stored on your device because it is based on the password that you choose.

It has become clear that privacy in a highly technological information society is a relative term, as the most sensitive details of an individual’s life are networked and accessible online. The only true solution to alleviating the uncertainty and unease of this is to create a realm of security—a virtual vault—that encrypts the most important data that you possess.

This is how Keeper was designed. Our software has been downloaded over 5 million times and usage is only increasing in response to the obvious threat that is posed by hackers.


RIP Steve Jobs, 1955-2011

by , on

“No one wants to die. Even people who want to go to heaven don’t want to die to get there. And yet death is the destination we all share. No one has ever escaped it. And that is as it should be, because Death is very likely the single best invention of Life. It is Life’s change agent. It clears out the old to make way for the new. Right now the new is you, but someday not too long from now, you will gradually become the old and be cleared away. Sorry to be so dramatic, but it is quite true.

“Your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma — which is living with the results of other people’s thinking. Don’t let the noise of others’ opinions drown out your own inner voice. And most important, have the courage to follow your heart and intuition. They somehow already know what you truly want to become. Everything else is secondary.”

Steve Jobs’s Best Quotes

Hacking Efforts Claim New Victim In Wall Street Protests

by , on

Callpod has been watching the news recently with a high degree of interest, as a recent wave of cyber attacks ensued upon the sensitive data stored online by members of Wall Street and those affiliated with the establishment against which the “Occupy Wall Street” movements has been been protesting. Earlier this week we shared the story of Goldman Sach CEO and Chairman Lloyd Blankfein’s data hacking, as well as Deputy Inspector Anthony Bologna’s exposure by hacker collective Anonymous.

JP Morgan Chase CEO Jamie Dimon is the latest target of online  activists, CNBC reports. “A document containing Dimon’s addresses, family members, political donations and other personal information were posted on the website Pastebin by hackers going under the name of “CabinCr3w.”

Cyber Attacks Take a New Angle

by , on

We recently reported on a data leak by hackers on Goldman Sachs CEO and Chairman, Lloyd Blankfein earlier this week. Since then, news reports have been developing regarding the connection of online activism and protests against Wall Street and the financial system.

“Members of the Anonymous collective are not just taking their activism to the Internet and the streets; they’re now targeting corporate financials with a securities research arm,” according to CNET, who displayed a type of logo for Anonymous, describing the organization as “Acquiring information through unconventional means”.

The unconventional means that are being described here have to do with the power that hackers have to infiltrate any computer or device that is connected to a network. In support of the hacker group Anonymous’s “anti-corporate, anti-censorship, pro-civil liberties messages” connected to the “Occupy Wall Street” movement, hackers have been using their skills for social activism.

Hackers found the personal information of Deputy Inspector Anthony Bologna and posted it online, after the officer was accused of spraying protesters with pepper spray in a video widely circulated  on the internet. According to the NY Post, “the hackers collective known as Anonymous put out the name and personal details of a high-ranking cop who pepper-sprayed penned-in Wall St. protesters over the weekend”.

Efforts by the hacking collective appear to be focused around the strategy of releasing the sensitive personal information of its targets.

Cybercriminals Target Investment Bank CEO

by , on

The eminent need for mobile device protection continues to grow. As we’ve pointed out several times in the recent past, we’ve entered a time in history in which mobile device security cannot be disregarded. Confidential company data that is analyzed and processed through devices that are susceptible to loss or theft holds immeasurable value. It’s not just competing companies that would like to access industry secrets held within your laptop, tablet or mobile phone, but state-supported hacking organizations and foreign cybercriminal rings that might find you and your information interesting if it were worth it to them.

Lloyd Blankfein, CEO and Chairman of Goldman Sachs found himself to be the victim of cybercriminal efforts recently, according to CNET.

Hackers released the personal information of Blankfein, “including the CEO’s age, recent addresses, details of litigation he has been involved in, as well as registration information for businesses, but no sensitive information such as financial data”.

Cloud Security

by , on

We emphasize the fact that your Keeper account is encrypted from the moment that your enter data into the program, according the the key that is established when you create your Master Password. This way only you hold the key to your data secured in the Cloud Security Vault™.

“By encrypting data themselves, using software with no backdoor, sites can assure themselves of privacy. The cloud provider, government officials, and hackers cannot get at the data in usable form.” Andrew Binstock, Dr Dobb’s

You Can’t Take A Vacation From Protecting Yourself

by , on
Right now in the midst of summer, schools are out of session and the weather is heating up. Families are packing their bags and heading out of town for vacation. We came across a study this morning that analyzed the habits of travelers who work remotely while they are away from home and on vacation on their mobile devices; i.e. the types of people who are our customers here at Callpod and benefit the most from all of our products.

The study reports some interesting statistics. Even while on an official holiday, over half of all office workers stay connected to the job through email and messaging to ensure that things are running smoothly in their absence. 41% of those surveyed reported taking mobile devices on vacation for work.

51% of the laptops that travel with workers are left entirely unsecured without even a password for protection- of those, only 26% will be encrypted.

In our white paper on mobile security, we point out the protection issues inherent to mobile devices. In addition to being susceptible to loss, damage and theft, the wireless connectivity points through which these devices access mobile networks each present opportunities for malicious users to compromise the Smartphone, laptop or tablet. When passing through Wi-Fi networks in the airport, hotels, museums, restaurants and other locations on vacation, a traveler could be exposing their device and the information kept within it to a greater number of hackers.

Traveling through a foreign or unfamiliar environment, makes retaining control over the data contained within your devices considerably more vital, especially when carrying work information. The transient, anonymous nature of your vacation destination can have a dark side to it when it comes to the microdata that identifies you in your mobile device. You would never leave your office door open or your filing cabinet unlocked in the middle of a well-trafficked street, but leaving your mobile device unsecured with unencrypted information carries the same sort of risk.

Andrew Cordial of Origin Storage states that the downside of having employees who work while on vacation is “the aftermath from these industrious workers when company secrets have gone AWOL”.

“The reality is that when corporate information is accessed from a mobile device, whether it’s personal or company owned and it’s misplaced there are consequences.”

As we’ve pointed out before, the very nature of mobile devices used for work demands that there be an extra set of protection for the data secured on the device. Most importantly, your critical information should be encrypted. Usage of Smartphones, laptops and tablets is only going to increase and will soon surpass the usage of desktop computers, making it all the more critical to institute measures that will ensure that no matter where you go, your information remains secure.

Ahead of the Curve In Mobile Security Standards

by , on

We saw a video on the mobile security standards that are being developed by the National Institutes of Standards of Technology (NIST). Our mobile security software, Keeper® Password and Data Vault stays one step ahead of the standard and leads the way by having addressed the major issues that this government agency is just beginning to identifying as the most important elements of mobile security software in its key features.

Keeper Enterprise allows the administrative control of the content and data on an employee’s mobile device, meaning that access to the encrypted data stored and managed within Keeper can be remotely wiped when it is decided that the information needs to be restricted.

In addition to this infinitely valuable function for enterprise users is the flexibility of Keeper. Our developers work steadily throughout the year to not only improve the software, but to also make sure that it can be used by as many people as possible. Available in the widest platform base of any mobile security software, Keeper provides the benefit of a standard of mobile security that does not require regulating an organization to use the same mobile device.

Our application works consistently with 99% of the mobile devices and operating systems on the market, meaning that a company would not have to restrict mobile device usage but could allow their employees to use Keeper on whatever is available—while still retaining control of what is stored within it. This addresses the concern expressed within the aforementioned video regarding the statement that the “many and evolving platforms are a moving target for standards and practices”— Keeper itself evolves quickly and constantly so that you are always protected on all fronts.

The Importance of Encryption, Illustrated

by , on

The key feature of Keeper® Password and Data Vault’s mobile security software lies in the 128-bit AES encryption that the application uses to protect the data from the user end, as it can only be decoded using the password established by the user. This article illustrates why anyone who accesses or stores critical information on their mobile devices needs to protect this information through encryption.

“The consequences of leaving behind these devices is difficult to quantify, but people traveling for business or pleasure are likely to access their company’s corporate network, favorite website or online merchant, resulting in sensitive information residing on endpoint devices. If unauthorized individuals can obtain one or more of the devices left behind at an airport, and the device is not encrypted, the consequences could be severe.”