JR RaphaelPCWorld Follow me on Google+

JR Raphael is a writer as well as a mammal. His stories are syndicated in dozens of publications and frequently clicked on by cats pawing haphazardly at their owners’ phones.

With a reputation as both "a leading voice in the mobile space" and "a guy who makes up quotes about his reputation," JR spends much of his time these days covering Android and other parts of the Google universe. He launched the Android Power blog in 2010 to serve as an unfiltered home for his various mobile musings. The blog has since grown to include a diverse mix of analysis, hands-on impressions, and consumer advice (which, in the spirit of full disclosure, is alarmingly high in unsaturated fat).

Android Power aside, JR is a contributing editor at Computerworld, where he reviews phones, tablets, and other devices; a regular contributor to InfoWorld, where he writes long-form feature stories; and a contributor to several other publications. The Washington Post, NBCNews.com, and Bloomberg BusinessWeek are just a few of the places where his byline has appeared.

JR is a frequent guest on the TWiT Network’s All About Android show as well as Mobile Nations’ Android Central Podcast. He has appeared on ABC World News and been cited in such places as The New York Times, The Wall Street Journal, CNN, and USA Today. He was even quoted in Walter Isaacson’s best-selling biography of Steve Jobs (yes, really!).

Despite his refusal to comb his hair, JR’s work has been honored with numerous awards, including two Emmys, three Murrows, and a smattering of top distinctions from the Associated Press. He has also been honored by the American Moustache Institute, though he’s been advised to keep that one quiet.

In his spare time, JR enjoys blinking, drawing polka dots, and imagining a world with no hypothetical situations.

Keep up with JR:

Karma hotspot

Karma Hotspot review: A mobile data plan with no-nonsense pricing

This genuine pay-as-you-go data suffers from limited coverage.

shutterstock ransomware man pointing gun out of computer

'Perfect' ransomware is the scariest threat to your PC

Ransomware with unbreakable encryption will attract cyber bandits like bees to honey. This is far worse than just malware.

Android, Bitcoin top malware targets, McAfee reports

Security vendor McAfee's research arm, McAfee Labs, has identified growth across four threat trends, including Android-based malware, signed malware, spam, and virtual currencies.

smartphones

Mobile device sales may slow, prompting deals, analysts say

As growth slows and vendors make less money on each sale, mobile operators will need to identify other services and perks to make money, according to researchers at Ovum.

on techhive.com

smartphones

Mobile tech forecast to fuel new Digital Industrial Economy

Worldwide IT spending will peak at $3.8 trillion in 2014, marking the beginning of the Digital Industrial Economy era, according to Gartner.

Smart spear phishing could kill the power grid, experts warn

While the energy industry may fear the appearance of another Stuxnet on the systems they use to keep oil and gas flowing and the electric grid powered, an equally devastating attack could come from a much more mundane source: phishing.

security

Hackers target social media, step up mobile attacks

Hackers are exploiting the lack of security basics among social media, mobile devices and even in business, reports an IBM X-Force analysis

Beware Android Trojans hitching a ride on botnets

Obad malware grows through zombie net, while Hesperbot takes a new tack on banking malware

on techhive.com

trojan horse

Trojan entices Craigslist users with fake software freebie

A malicious app is apparently being used to distribute mobile spyware on the popular via the free classifieds site.

Microsoft Office 2003

Office 2003's burial will resurrect hacker activity

The end of Microsoft's support for popular suite come April 2014 will usher in an era of 'infinite zero-day' attacks, analyst predicts

Mobile users rely on simple security methods, report says

With IT not requiring safer pass codes and device usability a factor, finding of 80 percent of users choosing convenience not surprising

on techhive.com

security

Password thieves target blogs, content management sites

Hackers are increasingly turning to brute force attacks aimed at snaring credentials.

Samsung Ativ Book 7 review: The look is fine; the feel is not

The Samsung Ativ Book 7 has a high-resolution touchscreen display and fabulous battery life, but its keyboard will drive touch-typists bonkers.

Email security strongest from social media, report reveals

One in seven emails from financial brands poses risks to consumers, a study suggests.

Denial-of-Service attacks trend to bigger scope, shorter times

Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released last week by Arbor Networks.