Mobile Safety

Cybercriminals are quick to cash in on the Poke-madness. Following the discovery of a malicious version of Pokemon GO app, a fake lockscreen app was recently discovered.
Three zero-day vulnerabilities were exposed after an attempted attack on a high-profile human rights activist’s iPhone. Apple responded quickly by releasing a patch to address the bugs.
As threats to mobile devices increase, developing good security habits becomes even more important. In this article, we detail current mobile threats and provide tips on how to secure mobile devices.
This research paper provides in-depth information on the operation and structure of a cybercriminal group found using fake banking apps to steal mobile banking credentials from South Korean users.
Sextortion operations aren't new, but a new modus operandi that makes use of malware and mobile devices is emerging in East Asia. This research paper offers an in-depth look at the operation, its perpetrators, as well as their tools and methods.
The results of a security preparedness survey reveal that more than half of organizations aren't ready to defend against online extortion and data breaches.
Don't assume that iOS is safe from malware and attacks. Previous incidents have proven that it's not as safe as you thought. Here are a few ways to tighten up security on your iOS device.
There are privacy and security risks involved in connecting to public or 'free' Wi-fi hotspots. Here's a 4-step guide to setting up a virtual private network (VPN) for the times when you have to connect to unfamiliar networks.
If you gotta catch 'em all, make sure that you do so safely. Here are some best practice tips to make sure you don't get poké-hacked.
To maximize the benefits of BYOD without increasing the risks, companies and their employees need to strike a balance between maintaining employee privacy and having control over corporate data on devices.
With Cyber Monday sales expected to rake in another record in most online sales in a day, threats are swooping in where people are most available and vulnerable. Secure your mobile shopping by following this flowchart.
Mobile payment systems are becoming a more popular method of payment for people on the go. This shopping season, learn how mobile payments work, the threats that come with it, and what you can do to stay secure.