Mobile Security

Cybercriminals are attracted by the richness of data available from our mobile devices, such as banking credentials, photos, and personal information. That is why we put security at your fingertips providing peace of mind to you. Read more about mobile security to help you stay safe, particularly on-the-go.

Think Twice Before Trusting These 14 Android Apps with Your Login Information
In life, there are a handful of people that each of us truly trust – and can...
Millennials Choose Convenience Over Security When it Comes to Information Sharing
For better or for worse, we’ve ended up amidst a society built on information sharing. There are...
‘Secret Chat’ Messages Aren’t So Secret After All
The universal truth about secrets? They almost always tend to get leaked. This was the case for...
Extend Mobile Call Time with Battery Optimizer
Nowadays, most people are constantly on the go–multi-tasking while moving from one place to the next. The...
Hacking Humans: How Cybercriminals Trick Their Victims
McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted...
Don’t Believe These 6 Mobile Security Myths
Smartphones are picking up popularity. You can now access email, social media, and other things from a...
Every Step You Take, Every Call You Make: Is Your Phone Watching You?
Imagine a world where every mobile move you make – each text message and phone call –...
What is Ransomware?
Imagine that you want to pull up a certain file on your computer. You click on the...
WhatsApp with End-to-End Encryption?
Throughout the past year, many mobile messaging apps have come under fire for inherent security vulnerabilities. This...
App Inventor Enables the Easy Creation of Malicious Apps
In today’s increasingly connected society, heaps of new mobile apps are cropping up every day. It no...
Android’s CyanogenMod Vulnerable to Zero-Day Threat
Have you installed CyanogenMod on your Android device? If yes, you’re likely vulnerable to a newly discovered...
Emma Watson Video Scam: Hackers Use Celeb’s Popularity to Unleash Viruses
Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened...
349 - 360 of 444
Back to top