The team say tracking commuters on the metro is possible due to a lack of permissions required on Android phones.
Showing results 1 to 20 of 286
Microsoft Research and Duke University are combining device graphics chips with those in the cloud to cut mobile broadband usage for streamed applications by up to 83 percent.
Catering for enterprise mobility requirements requires more than just device delivery, says HP's mobility business unit chief Michael Park, while delivering details on eight new devices aimed at a range of business markets.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Forrester Research gives BlackBerry props on its enterprise mobility management rankings in contrast to Gartner.
If your company wants to write a smartphone or tablet application, it should consider these do-it-yourself options notable for their simplicity.
New research concludes ERP budgets are shrinking but project length and delays have increased. Why the contradictory data?
Hiding an antenna in a shopping cart, researchers tested the success rates of stealing sensitive customer data in near-field contactless payments - and got "consistently good results."
Obvious security vulnerabilities are disturbingly common in corporate mobile apps. If HP can find them, so can malicious actors.
In the upcoming spectrum auction, the Defense Department has offered to compromise with carriers over resources currently used in military programs.
The focus of these platforms is on rapid, visual development for teams that don't have programming or development backgrounds.
As more technologies become available, they become more accessible and cheaper for small and medium-sized businesses to obtain, as evidenced by a TechRepublic survey.
The Western European mobile market has dropped in Q1 as consumers continue to prefer smartphones over standard mobile phones.
Mobile carriers will ease the strain on their overstretched networks by offloading an increasing amount of data traffic onto Wi-Fi and small cell networks, reaching about 60 percent in 2017.
Many banks treat mobile banking like an ancillary service channel, but it’s becoming the main game for USAA and Australia’s Defence Bank at an "incredible" rate, bank strategists say.
According to the latest research, around one quarter of all U.K. small-medium sized enterprises do not have the resources to fend off cyberattacks or hackers.
Espionage campaigns seek data that furthers national interests, such as military or classified information, economy-boosting plans, insider information or trade secrets, and technical resources such as source code.
New research offers important lessons for chief financial officers when buying and implementing enterprise technology.
Does China have the resources and talent to become the next hotspot for innovation, research and development?
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks