Abstract :
This paper proposes a new security research covers BlackBerry issues relating their own features relied on highest possible way of integration and aggregation with data, service and application that simplifies management. Such way integration shapes developer´s outlook as well as malware writer´s outlook led to the bypass security methods. Despite of that, BlackBerry is full of holes to the brim if consumer has a flexible IT Policy even because current security techniques implemented in BIS (BlackBerry Internet Service) or BES (BlackBerry Enterprise Server) are indecisive argument to be sure in security and privacy and do not provide enough controls. As opposite to smartphone, the tablets (PlayBook) are quite new, QNX-based and have the most known technologies, such Adobe Air, HTML5, and Android Dalvik-Runtime, are implemented widely. However, they have a poor application environment and a little those feature known on non-QNX BlackBerry device. This makes security more difficult and unstable to reliably use it by end-users. Research shows that additional third party security solutions often ruin security while native environment allows intercepting, blocking, stealing, misleading, substitute data in real-time bypassing security controls that, finally, reveal sensitive information and turn security solutions to the malware agents.
Keywords :
data integration; invasive software; mobile computing; notebook computers; operating systems (computers); Adobe Air technology; Android Dalvik-Runtime technology; BlackBerry OS; BlackBerry PlayBook; BlackBerry enterprise server; BlackBerry internet service; HTML5 technology; IT policy; data aggregation; data blocking; data integration; data interception; data misleading; data stealing; data substitution; information technology policy; malware agent; mobile OS; operating systems; security technique; tablet computers; third party security solution; vulnerability elimination; Cameras; Cryptography; Electronic mail; application pentesting; blackberry; blackberry playbook; mobile security; real-time data manipulation; security issues;