Disrupting a cell phone is the same as jamming any other type of radio communication. A cell phone works by communicating with its service network through a cell tower or base station. Cell towers divide a city into small areas, or cells. As a cell-phone user drives down the street, the signal is handed from tower to tower.
The millions of people using dating apps on company smartphones could be exposing themselves and their employers to hacking, spying and theft, according to a study by International Business Machines Corp. IBM security researchers said 26 of 41 dating apps they analyzed on Google Inc's Android mobile platform had medium or high severity vulnerabilities. IBM found employees used vulnerable dating apps in nearly 50 percent of the companies sampled for its research. Using the same phone for work and play, a phenomenon known as "bring your own device," or BYOD, means users and their employers are both open to potential cyber attacks. IBM said the problem is that people on dating apps let their guard down and are not as sensitive to potential security problems as they might be on email or websites. If an app is compromised, hackers can take advantage of users waiting eagerly to hear back from a potential love interest by sending bogus "phishing" messages to glean sensitive information or install malware, IBM said.
The LG G Pad 8.0 is an 8 inch tablet that runs the Android operating system. It weighs 342g, has a 5 MP camera and all the bells and whistles one would expect in a high end device. Cost R4 500
The Sony Xperia™ Z3 Tablet Compact is a 8 inch tablet running Google’s Android operating system. It is beautifully designed and is just 6.4 mm slim and weighs only 270 g. It is also waterproof and features the impressive Triluminos display technology and has a 15 hour battery life. Cost R9 500
Jannie van Zyl, Vodacom's Executive Head: Innovation
This article first appeared on 702 : TECHNOBYTE for 13 February 2015