Wednesday 24 August 2011

The Twitter Animal Kingdom


Since my conversion in January of this year I am now a big Twitter advocate. Along with the majority of tech-savvy Businesses and individuals I now regularly converse with Tweeps and am more than happy wallowing in hash tags. The increased exposure has yielded an interesting observation however, that much like most collections of Human Behavior, those using Twitter seem to fall into one of a few categories.

When I pick up a follower notification or stumble upon an interesting looking character, I now found myself slotting them neatly into a group. Not an online group, or even a Twitter list, just an amusing demographic yard stick to try and make sense of the 140 character universe. My Attenboroughs guide to Twitter birds is below...

The Kukaburra - Spammers or self promoters. Users who are either spam-bots or the human equivalent. Senseless and shameless hammering of the same tweets, retweets, or links. Noisy and obnoxious, quickly become tiresome. Naming and shaming @DamnTeenQuote, @Florinemuo, and @jamesvimcmorrow

The Woodpecker - The possessed and deranged account of a hacked user, forced to send bizarre messages and replies to everyone attached to that account like "ROFL this pic i found of you had me dying lol http://t.l9pI". Mindless and irritating, and happy to lay its tweet eggs in others nests. Most recent encounter of this was from @LittleTheatreUK, hope they sorted it out.

The Magpie - A lover of all things shiny, our Twitter Magpies spend most of their time scouring the great web outdoors, looking for an assortment of shiny objects and links to interesting topics. Invariably their news feed will largely be filled with just such little gems and not much else of their own creation. Sometimes guilty of this: @peterwillb and @leepaulkennedy

The Peacock - A frustrated male or female Tweeter who has the urge to display themselves. Using Twitter as another forum to show off their plumage their twitter feed and their image links will be tantamount to a models head shot catalogue of variable quality. Nice enough to listen to, but one too many picture of their guns or their cleavage will most likely have you wanting to fly the nest. Some classic examples from @honeystweet7 and @BigRonColeman.

The Robin - Nice to look at and keeps themselves busy. A general all-round "brighten up your day" tweeter, unfortunately rather rare in the natural environment. Some examples of the endangered species: @TextTonic and @Seema_Shariat , let me know if you find any more!

The Seagull - A glutinous sort, tends to eat a lot and then make a lot of noise about how much they are enjoying themselves. Normally found tweeting about how great their cup of coffee was or how much they are going to enjoy a takeaway tonight. A strange breed without much to actually say, but plenty of enthusiasm to say it. Plenty of examples, you know who you are.

So there you have it, a journey through the unpredictable Avery that is www.twitter.com. How would a twitter ornothologist classify you I wonder?

Wednesday 17 August 2011

Beware the Mobile Malware


Our home PC's have long since been besieged by a threatening armada of security threats. Ever since I can remember picking up a mouse there has been a looming threat of Viruses and more recently breeds of mal- and spyware which can run amok in an unsuspecting users machine.

I suppose inevitably enough the scourge has spread to our beloved Smartphones. With the discovery of a particularly unnerving breed of Android Malware which can record and export calls, SMS and even phone location the Mobile world is becoming another battleground. Android and iPhone users are now recommended to install and maintain anti-virus software on their handsets in order to protect their pocket device. With huge amounts of data being hauled around in a device which might wrongly be considered immune, it is probably time for us Smartphone users to tighten our belts.

Details in a recent report show Android users are now two and half times more likely to stumble onto Malware in the Android Market than they were in January. Apple iOS users who rely on manual connection to iTunes are also lagging behind on firmware security updates which is unlikely to change until the impending 'over-the-air' update mechanism rolls out in iOS 5. In true Corporal Jones style there really is no need to panic, however the general advice (as with PC users) is to take precautions by installing some protection software.

I have tried a few on the Android platform and heres my low-down...

Lookout Mobile Security - https://www.mylookout.com/

I first tried this one when it was in Beta early last year. A complete security offering which is now offered in a slimmed down free flavour, and a premium full featured package. After installing the app the user is able to remotely locate, lock, or wipe their handset. Anti-virus and on demand scanning come as standard and data backup and restore is also offered through over-the air transmission to lookout servers.

I tested the locate function on Android Gingerbread this morning, whilst it took a little longer than expected (5 mins+) it duly prompted my that it had found my phone with a convenient and accurate email notification. The security scanning seems slick and reliable so far which is the important part.

Available on Android, Blackberry, and Windows Mobile platforms, the majority of smartphone users are protected.

Verdict: 8/10. A reliable solution for security and loss/theft options and has come a long way since beta. Good value at $19.99 a year and will help give you peace of mind that your handset is protected and retrievable above and beyond a standard keylock and insurance policy.
McAfee Mobile Security - http://www.mcafeemobilesecurity.com/
After picking up mobile security pioneers Wavesecure last year McAfee have been quick to put together an offering to keep mobile users secure alongside their desktop and server protection. Building on the original Wavesecure concept which centered on remote locate, lock and wipe functions McAfee Mobile Security provides real-time scanning alongside a comprehensive online portal allowing extensive remote control of the device.

Supporting Blackberry, Symbian, Android and iPhones, this is a solid offering for mobile users across the board. The feature of remotely shutting down a phone but extracting your personal data covertly over the network before ordering a "nuke" of the phone is certainly a feature which will put some more troubled minds at ease.

Unfortunately however, my experience with this software on Android certainly takes the shine off. Remote requests are issued via text messages. For some reason which is not abundantly clear McAfee have retained Wavesecure's Singapore messaging servers. A request from your online account will therefore prompt a costly text message from an international number in order to kick your phone into action. Simply testing the locate and lock I managed to add £3 to my bill. On top of a $29.99 yearly subscription you might start to wonder if its worth it.

Verdict: 5/10 Nice idea and looks great to start with. Execution and reliability seems poor, although with some tweeks and reduced cost this is probably the most comprehensive solution available. Shame really...


Security Apps for Android
AVG Mobilation/Anti-virus Free - http://www.avgmobilation.com/
A more recent contender in the market, the product of AVG and DroidSecurity is the AVG Mobilation package suitable for Android smartphones and tablets. On first installation and to the discerning mobile app user the visuals of the app are a little unnerving. Pale white screens and non-branded app logos make this offering look like malware itself. However pressing on I discovered a comprehensive scanning functionality which delves deep into settings, emails, SMS, contacts and even bookmarks.

Assuming you trust AVG's signatures, this looks like a pretty watertight solution for the security minded Smartphone user. The on-demand and real-time scanning features are also lightweight and efficient so you dont have to worry about your Smartphone real estate being gobbled.

The free trial of the pro software lasts 30 days which should give you ample chance to test if its for you (full version license £6.15) Alternatively there is Anti-Virus free which offers continual free (albeit slightly slimmed) protection.

Verdict: 7/10 Looks to be a great option for comprehensive threat protection, cant help feeling that one of the 'all-round' solutions offering remote locking and location offers a better investment if you want to spend cash on protecting your handset.


So there you have it, a whistlestop tour through Mobile security, for a full run down check out this from Top Ten Reviews.

Happy (and safe) Smartphoning!

Monday 8 August 2011

The Instant Relevance Age


Social media as a concept has revolutionised information sharing and growth of communities online. Being a largely wholesome pursuit, an appreciation of a softer side of marketing and more personal communication which Social Media embodies has been a positive influence for Businesses and individuals alike.

Platforms such as Facebook and Twitter provide not only instant communication (which is expected as a minimum in our digital age) but relevant and immersive methods of engaging with groups of people according to their relationship with you, or common interests. Personally I believe the point at which the internet was at its broadest has now passed. A content explosion spurred on by multiple social media platforms coming to maturity in the past 5 years is now coming into some form of order. Whilst it is exciting for a single internet user to behold a potentially limitless bounty of content, the time has come for relevance.

Increasingly content hosting websites across the globe and from all sectors are striving to provide a more personalised experience, acknowledging that users want information useful to them, not endless streams of data. BBC iPlayer allows users to save favourite programmes and makes recommendations based on these preferences. Twitter provides its lists function which facilitates the amalgamation of streams into a single interest area. Facebook groups currently provide the best forum for informal but closed information sharing within a like minded set of individuals. And of course Google have spearheaded their social media offering with the Circles concept, encouraging selective and tiered sharing of content to ensure maximum interest for those at both end of the exchange.

So as Internet users we can now enjoy a highly tailored yet rich immersion into content which we enjoy. Yet this is not without its price. By the nature of expressing and recording a preference we are placing more of our personality into cyberspace. For instance, if you were to take advantage of all the forums listed above, someone who gained access to your accounts would quickly be able to garner your friendship groups, your relationship with colleagues, and even your favourite television programmes. The increasing concerns surrounding identity theft highlight readily available photos, personal preference information, and location data to be serious exposures for the average internet user. This friendly infographic from mashable spells out the considerable cost of the new criminal pastime.

And the undercurrent of online persona has not gone unnoticed by society as a whole. The recent London riots have in part been attributed to the almost military grade communication mechanisms now available to the average phone user. The ability to secretly share instant group messages whilst on the move is a powerful tool and one that realistically has only just come into widespread existence. Whether or not it facilitated the recent mob violence it highlights the potential power of limitless social communication and might be a sign of things to come.