Mobile Safety

Major software and OS vulnerabilities and the prevalence of adware and potentially unwanted apps make up the most notable stories of the mobile threat landscape over the first half of 2015.
What is the RCSAndroid spying tool capable of? Who is affected? Which devices are vulnerable? Here are some quick facts you need to know about the Hacking Team’s leaked mobile malware suite:
Sending malicious apps via MMS isn't just the only way to exploit the Stagefright vulnerability. Another flaw in the system's mediaserver component involves its inability to properly handle a malformed MP4 file, which can be exploited.
Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
There are privacy and security risks involved in connecting to public or 'free' Wi-fi hotspots. Here's a 4-step guide to setting up a virtual private network (VPN) for the times when you have to connect to unfamiliar networks.
Don't assume that iOS is safe from malware and attacks. Previous incidents have proven that it's not as safe as you thought. Here are a few ways to tighten up security on your iOS device.
How can you secure your Android device? Here are simple security tweaks you can do right now to make sure that your device—and the data in it—is protected:
BYOD networks can benefit both the workers and the company, but it also presents a number of potential risks. This infographic details the challenges of balancing employee freedom, functionality, and security on BYOD.
Mobile payment systems are becoming a more popular method of payment for people on the go. This shopping season, learn how mobile payments work, the threats that come with it, and what you can do to stay secure.
With Cyber Monday sales expected to rake in another record in most online sales in a day, threats are swooping in where people are most available and vulnerable. Secure your mobile shopping by following this flowchart.

Connect with us on