Mobile

855

Solutions

1K

Contributors

Mobile web development, also known as responsive web design, is an approach to web design aimed at crafting sites to provide an optimal viewing and interaction experience—easy reading and navigation with a minimum of resizing, panning, and scrolling—across a wide range of devices (from desktop computer monitors to mobile phones). A site designed with RWD adapts the layout to the viewing environment by using fluid, proportion-based grids, flexible images, and CSS3 media queries.

Share tech news, updates, or what's on your mind.

Sign up to Post

SecPIVOT
Take a step back to reflect where are we now and where we should be heading to in the next (and many more) tranches of getting to implement the RIGHT security. We need to build security PIVOT to stay in the cyber chase with the adversaries.
2
OWASP: Avoiding Hacker Tricks
LVL 13
OWASP: Avoiding Hacker Tricks

Learn to build secure applications from the mindset of the hacker and avoid being exploited.

Call Recorder S9
Would you like to have the ability to record both your inbound and outbound calls on your mobile with ease? Read on for a review of this excellent recently released App, along with instructions on how to use it. Enjoy...
5
LVL 27

Author Comment

by:Andrew Leniart
Comment Utility
Thank you for your kind comments and for endorsing the article Brandon, Very much appreciated.

Kind regards, Andrew
0
LVL 27

Author Comment

by:Andrew Leniart
Comment Utility
@Scott

Good info for those who decide to opt for Google Voice. Thanks for sharing your info.

Regards, Andrew
1
This article summarizes all the important questions that an app development team has to ask the client before stepping into the development process
0
The biggest challenges when it comes to mobile security: protection, integration and visibility.
6

Expert Comment

by:Jake Lees
Comment Utility
Nice post. Love to read it.
1
Mobile security
Your smartphone is the weakest link so if we have not been taking good care of it and looking out for signs of red flag that the it is misbehaving and acting strangely, then we are setting ourselves for trouble. Read on for tips to self defence and keep a clean hygiene footprint.
3
LVL 69

Author Comment

by:btan
Comment Utility
Thanks Andrew.

1a. Facial spoofing attacks can easily launched via printed photos, video replays and 3D masks of a face. There is a detailed paper written on this. That is why it is critical to implement strong liveness detection measures for facial authentication that recognize when a facial image is not a live. To share a bit more, spoof detection can be classified as either “active”, requiring interaction with the subject, or “passive” analysis requiring no interaction.  

1b. Fingerprint spoofing attack can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. Likewise another paper shares the details. What I think is concerning is the capture in the past has also been attempted on gummy fingers that is fake Fingers. Liveness test is still the added assurance check needed to have a robust check in the mobile device.

The challenge for a/m is not on the detection technology but how to more towards a more accurate match rate an d at the same time not in the expense of making the device bulky or more draining to the limited battery level.

2. Actually remote wipe is more of a mitigation as ultimately, if the data remain encrypted and the device has lock enabled, access is restricted and even data siphoned off the shutdown or locked device will not necessary have the plain data revealed. So with encryption and locked setting, the mitigation suffice as baseline.

Hope the above clarifies.
1
LVL 27

Expert Comment

by:Andrew Leniart
Comment Utility
Thanks for clarifying btan. Highly useful information!
0
Secure Mobile DNA
The explosive trends of the increasing number of mobile devices and apps get us in trouble despite the benefits they give. Run through the common threats faced. Tackle them with a strategy to better secure our mobile device and apps against these emerging threats.
0
Maintain an Effective Business Website -
Maintaining an effective business website is a complex task, seeing as how efficiency might be interpreted in different ways. Here are top five techniques and methods to maintain an effective business website.
0
Top Mistakes Every Android Developers Should Avoid -
In case of misses during the development process, the stability of the app gets affected, resulting in loss of market share. Thus, Android application developers should avoid certain mistakes that might stand in the way of seamless application development.
1

Expert Comment

by:Jake Lees
Comment Utility
nice one
0
Ionic Framework
When it comes to building mobile apps, it is important to consider a framework that is easy to work upon and provides good benefits. The "Ionic framework" is one of the latest frameworks considered by Ionic App Development Companies when it comes to building mobile applications.
1
We can see that the frameworks like React Native and PhoneGap make the development process of the applications relatively less expensive and more accessible than the development would cost when written in the native language for the platform.
0
Introduction to R
LVL 13
Introduction to R

R is considered the predominant language for data scientist and statisticians. Learn how to use R for your own data science projects.

App Development

Apart from its culture, demographics, and beliefs, Indian infrastructure is also quite complex, especially because of the challenge of overpopulation that stares us right in the eye. Due to this, it has been quite difficult to anticipate the traffic behavior, directions, local businesses, and many other things, with accuracy. When Google Maps was launched in India, it certainly helped, but also showed us that we need a better solution. Something that is indigenous, so that it knows the country inside out. Hence, MapMyIndia.


A mobile apps development company that works in sync with ISRO’s Bhuvan satellite - MapMyIndia recently launched its navigation and positioning app, created exclusively for India, and is already giving tough competition to Google Maps. It provides accurate information even for daily commuters. In fact, it has taken it a step further by including many live features that are extremely helpful, especially when you are in a country like India where traffic situations and even addresses change every now and then. So let’s take a look at what features it brings together to create something that is messing with the Google ‘bear’.


IoT Tracking


A big leap ahead for India with this IoT solution, the app uses its own IoT devices to track and collect information from different points through sensors. Making the best use of IoT technology, the app has been instilled with the ability to create real-time alerts for users and commuters. In case of a traffic jams, IoT sensors take note of the situation and suggest short and alternative routes to mitigate the traffic.


Voice-guidance


Matching shoulders with Google, the app also provides a voice navigation facility with turn-by-turn navigation support, which is expected to decrease the rate of road accidents that happen due to the lack of hands-free GPS systems.


Floating button for Reporting Issues


Apart from the data collection via the IoT system, there is a manual way of reporting issues i.e via people. Road damaged? Broken transport? Traffic jam in your area? Just take a picture and upload it to the relevant section in the app. Good thing is that the app has covered almost all kinds of issues that occur, including map issues, traffic issues, connectivity issues, and areas with specific access.


Tailored for India


Compared to Google Maps, MapMyIndia focuses on much more detail and list small businesses, facilities, shopping centers, and even personal addresses. However, because the app is still quite new to the market in terms of reach, it is still under the data collection phase, during which you may not find many small addresses in the app. But that is only for now because the database is constantly growing.


Detailed Information


Another reason why the app has great usability in India is that it provides complete information about a particular thing that you look for on the map. Apart from the address and direction, you also get a contact number, email, website and opening hours. Also, with the help of worldview, not only you can get details about a place, you can also see what people think of this place, based on the number of likes it has garnered.


Analytics


Some people just want more information about everything, including trips, so just an odometer and tachometer is not enough for them. MapMyIndia comes with trip analytics that allows info savvy people to track more. You can track the time of trip completion, estimated time of arrival, remaining distance, remaining time of arrival, and much more; on-the-go.



MapMyIndia has created something that is perfectly tailored to the ever-changing maps of India. However, one of the things that the application clearly lacks is user experience. The touch buttons and screens reflect subliminal efforts on the designing side. 


To learn more about me, please visit my Experts Exchange Profile page.



0
If you have a smartphone, I'm sure you've noticed that web applications are changing. Yet, are you aware of how these changes are going to impact your organization or company?
1
Android Mobile App development
This article is about the challenges faced by Android app developers.
1

Expert Comment

by:Jake Lees
Comment Utility
good to read.
0
In this article, I explain everything about the complete journey of a mobile app and its development lifecycle. Read the complete article to learn more about this fascinating topic.
1
Before you approach an Ionic Mobile App development company for developing mobile apps using the ionic framework, you must know why you should choose the framework. Let's try to understand that through this article.
0
How do you create a user-centered user experience on your website? And what are some things you should consider in the process?
0
Ready to kick start your career in 2018? Add app developer skills to your resume. January’s Course of the Month features Android App Development training with hands-on learning. Read on to learn why these skills are important.
4
3 Simple Steps to Execute a Customer Survey Successfully
Conducting a customer service survey used to be as straightforward as sending a template email out using checkboxes and numerical rating systems to measure satisfaction.
2
Welcome to 2018! Exciting things lie ahead in the world of tech. To start things off, we compiled great member articles on how to stay safe, ways to learn, and much more! Read on to start your new year right.
0
Fundamentals of JavaScript
LVL 13
Fundamentals of JavaScript

Learn the fundamentals of the popular programming language JavaScript so that you can explore the realm of web development.

Seo
We take a look at the fast-evolving changes in Search Engine Optimization rules and algorithms by Google.
0
Password-Managers
Each password manager has its own problems in dealing with certain websites and their login methods. In Part 1, I review the Top 5 Password Managers that I've found to be the best. In Part 2 we'll look at which ones co-exist together and why it's often useful to use more than one.
12
LVL 32

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Andrew,

Have you read the latest information regarding password managers?  I saw something this morning on LinkedIn and did a search and found this:

https://www.komando.com/happening-now/547660/hackers-find-security-flaws-in-5-popular-password-managers-are-you-safe

It comes down to password managers exposing your passwords!!

This is extremely disconcerting as I have several hundred passwords stored in my PM.
1
LVL 27

Author Comment

by:Andrew Leniart
Comment Utility
Thank you for the heads up, Thomas. No, I hadn't read that article as yet and am as alarmed as you are about the prospect.

at least five popular password managers, including 1Password, Dashlane, KeePass and LastPass, could potentially leak unencrypted credentials and passwords while they're running in the background.

That's very disconcerting information on its own! I'm sure glad that RoboForm, Avast, and Sticky Password (the three password managers I'm currently using) didn't make that list, but two of those, 1Password and Dashlane, are in my review as recommended. :-o

Given the large number of Popups that broke through Adblock Plus when I visited your link, I think I'll quote the article here so others can read it without all of the annoying popups.

Crediting Source: Hackers find security flaws in 5 popular password managers. Are you safe? - By "The King Komando Show"

Hackers find security flaws in 5 popular password managers. Are you safe?

Password managers are great tools for hardening your online security and, trust me, they can definitely make your life easier. But as always, like anything that's powered by software, password managers are not perfect and they're not impervious to hacks and malware.

This new research proves just that. According to new information published by Independent Security Evaluators (ISE), at least five popular password managers, including 1Password, Dashlane, KeePass and LastPass, could potentially leak unencrypted credentials and passwords while they're running in the background.

How severe are these issues? Or are they nothing to worry about? Let's break them down.

It's like leaving your keys under your PC's doormat

The researchers from ISE (read: white hats aka the good hackers) said that the password managers they examined don't always encrypt and clear the password from a computer's memory while transitioning from an unlocked (password manager is running) to a locked (user is logged out) state.

1Password, in particular, keeps the master password in memory while unlocked and fails to clear it out when it goes back to its locked state. In some cases, the master password can even be viewed in clear text while the software is locked. Yep, in a way, it's like leaving your keys under your doormat.

Surprisingly, 1Password's newer version, 1Password7, is even worse since it decrypted all individual passwords in ISEs test, cached them all in the computer's memory and failed to clear them out while transitioning from its unlocked state.

In Dashlane's case, only the last active password is exposed in memory while it's running, but once a user updates any information on an entry, it exposes its entire database in plaintext in a computer's memory. Worse, this information then remains there even after a user logs out of Dashlane.

Similarly, KeePass and LastPass also showed vulnerabilities by keeping some of their unencrypted entries in a computer's memory even after they return to their locked states.

In most cases, closing out of a password manager completely (not just logging out of it) is the only way to clear the cached passwords from your computer's memory.

They're only as strong as your computer's defenses

Is it time to panic? Not exactly. Here's an important thing to keep in mind regarding these flaws -- these are only exploitable if a hacker has already managed to install malware on your computer. Your computer's operating system has built-in defenses against these type of memory access attacks, anyway.

If someone can already peer into your password manager's cached data, then your entire system is already compromised and your computer has bigger problems than that. Spoiler alert: Keyloggers, spyware, remote access software and ransomware can do much worse damage, and your password for CuteShoes.com may just be the icing on the cake.

In fact, these security issues on password managers are nothing new and they're all inherent to how they work within, say, an operating system like Windows 10. Thankfully, developers are still coming up with new mechanisms to protect password managers against cleartext password exposures in memory and malware attacks in general.

The bottom line is this - if you are not employing good security measures on your computer, then nothing, not even your password manager, can keep you safe.

Keeping your software updated by patching regularly, using reliable security software, strong passwords and enabling two-factor authentication are just some of the best practices you can do to keep your gadgets safe. Click here for more.  Oh, and before I forget, using a password manager is still highly recommended. Please -- don't stop using yours.

Bonus: Our sponsor F-Secure TOTAL is a complete cybersecurity package that includes password protection. Store all your important credentials in one secure password manager and use them faster and easier to log into your favorite services or pay securely online. Just visit F-Secure.com/Kim.

Will be very interesting to follow this and see how it pans out.

Regards, Andrew
0
Will the future of mobile app development include the same trends as those most relevant today? Find out by checking out the 7 trends of the future.
0
Cordova and Dropbox
Creating a Cordova application which allow user to save to/load from his Dropbox account the application database.
2
Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.
0
LVL 1

Author Comment

by:Steve Marin
Comment Utility
Not sure what you're talking about?
0
LVL 1

Author Comment

by:Steve Marin
Comment Utility
Didn't refer to it as Doxware because I had not heard it referred to as such. Great article though.
0
Hybrid app
If you are a mobile app developer and especially develop hybrid mobile apps then these 4 mistakes you must avoid for hybrid app development to be the more genuine app developer.
1

Mobile

855

Solutions

1K

Contributors

Mobile web development, also known as responsive web design, is an approach to web design aimed at crafting sites to provide an optimal viewing and interaction experience—easy reading and navigation with a minimum of resizing, panning, and scrolling—across a wide range of devices (from desktop computer monitors to mobile phones). A site designed with RWD adapts the layout to the viewing environment by using fluid, proportion-based grids, flexible images, and CSS3 media queries.