Mobile Security

Reasons Why You Should Fortify Your iOS Passcode Today

Reasons Why You Should Fortify Your iOS Passcode Today

If you are an iOS user who doesn't use a passcode or uses the same passcode for everything, It’s time to toughen up. Here’s why: 1) You store contacts, emails addresses, pictures and videos, social media, work email, messages, Web browsing, payment card information, location history and much more. If you don’t protect it then the day you lose that device is the day someone much meaner than...

WebView: In-app Browser of Android Gets a Security Upgrade

WebView: In-app Browser of Android Gets a Security Upgrade

One often-used component of Android is WebView, a micro-browser that lets you view web pages from inside apps, rather than having to use Chrome. However, pointing a slender window towards the internet is an easy way for a nefarious type to get past your device's security. It's an issue that the folks at Google are taking seriously. Google has announced a pair of updates for the platform,...

Boss of Dating App Find ‘No Problem’ with Face-Matching without Consent

Boss of Dating App Find ‘No Problem’ with Face-Matching without Consent

Why waste time with tedious swiping? Just upload a photo of someone you want to date — including yourself, as BuzzFeed suggests, à la Narcissus — and the app will use facial recognition to scan thousands of profile photos sourced from dating sites and apps to find people whose faces are similar to what you’re after. Clicking on photos of the face matches will take you to their profiles on...

More Mobile Apps Means More Chances of Man-in-the-Middle Attacks

More Mobile Apps Means More Chances of Man-in-the-Middle Attacks

When you travel outside your corporate network with your mobile device, you are much more vulnerable to man-in-the-middle (MitM) attacks. There are several issues at play here that are worth considering for security professionals. First, mobile endpoints are more vulnerable to these Man-in-the-Middle Attacks, because bring-your-own-device (BYOD) policies make it harder for IT to manage devices in...

How Cybercriminals Are Using Android Security Update Bulletins to Plan Attacks

How Cybercriminals Are Using Android Security Update Bulletins to Plan Attacks

A TechRepublic blogger interviewed an Android expert, who on the grounds of anonymity spilled some beans about Android security updates. According to him, it's the coders of malicious software that read those updates. You see, those that create malware read the bulletins to find out what ails the Android platform and then, in turn, craft their malware to take advantage of those flaws. Those...

You're Sharing Your Mobile Phone Number too Frequently

You're Sharing Your Mobile Phone Number too Frequently

There’s a new risk to our privacy and security: Our cell phone numbers are being used increasingly by information brokers as the window to personal information that’s kept by nearly all corporations, financial institutions, and, yes, social media networks. Millions of us divulge our mobile numbers in stores and online on a daily basis. Your cell phone number, unique to you, is the gateway to...

The Adware Apps on Google Play that Seems to Never Die

The Adware Apps on Google Play that Seems to Never Die

Several popular Android apps in Google Play are rigged with a third-party library that continuously pops up ads even if the user tries to force close them. SophosLabs discovered the library earlier this week and detects it as App/MarsDae-A. So far, more than 40 apps on Google Play use the library, which has been downloaded up to 6 million times. Sophos protects its customers from these apps. The...

Scam App in Apple's Top 10 Collects in $80,000 Per Month

Scam App in Apple's Top 10 Collects in $80,000 Per Month

One of Apple’s top 10 productivity apps—“Mobile protection :Clean & Security VPN”—has been pulled from the Apple store after it was uncovered as a scam—and an obvious one at that, starting with the grammar issues in its name. At its height, it was raking in $80,000 per month. “Given the terrible title of this app (inconsistent capitalization, misplaced colon and grammatically...

Mobile Device Hackers Get Sophisticated with Chain Attacks

Mobile Device Hackers Get Sophisticated with Chain Attacks

Cybercriminals have moved to a new level when attacking mobile devices replacing their simplistic attack methods with sophisticated and stealthier models that now use chain attacks instead of one of the older one-trick pony hacks that simply tried to elevate privileges, according to Checkpoint. The reason cybercriminals have switched to using chain attacks is they are much more dangerous and...

Be Aware of Mobile Malware

Be Aware of Mobile Malware

A serious threat to banks today is the risk to customer and banker smartphones. Apps on people’s devices come from an official source related to that device. The store operators are supposed to vet the offerings available to be sure that they don’t contain harmful code. These efforts can protect many users, says analyst Al Pascual, but a risk remains. Pascual points out that there’s a major...

Google: reCAPTCHA API for Android

Google: reCAPTCHA API for Android

Google announced on 9th June that it has made a new reCAPTCHA API available for Android. The API is part of Google Play Services, Google said, and developers can now add the verification to mobile applications to distinguish between bots and human users. “It will use our newest Invisible reCAPTCHA technology, which runs risk analysis behind the scene and has enabled millions of human users to...

Steps to Follow when an Identity Thief Takes Away Your Phone

Steps to Follow when an Identity Thief Takes Away Your Phone

Identity theft can happen to anyone. Knowing how to respond will help you if you ever have to recover your identity. Act quickly to protect your identity; go to IdentityTheft.gov and file a report to get a personalized recovery plan. Whether you’ve lost your device or you want to be prepared, here are some tips you can take to protect your digital identity. To protect smart phones: 1) Lock your...

  • More at FTC
  • |
  • |
What’s Really Preventing Users From Adopting Secure Communication Tools?

What’s Really Preventing Users From Adopting Secure Communication Tools?

“Users’ goal to communicate with others overrides everything else, including security,” a group of researchers has concluded after interviewing sixty individuals about their experience with different communication tools and their perceptions of the tools’ security properties. It has long been thought that usability issues are the main thing preventing users from adopting secure...

Is it Unsafe to Share Your Location on the Internet?

Is it Unsafe to Share Your Location on the Internet?

Location sharing is incredibly useful – when used correctly. Here are a few things you should be aware of: 1) “Check-ins” and Strangers: Apps like Foursquare and Swarm encourage users to “check-in” when visiting restaurants, bars and other places of interest. Facebook and Twitter also allow users to share photos, comments and their exact location with status updates. When you have...

Mobile Security is About Risk and Identity Management

Mobile Security is About Risk and Identity Management

Two years ago, mobile device management (MDM) was the buzz. Mobile security was an essential part of a mobility strategy, and every enterprise needed one. Today, not so much. About 18 months ago at least, businesses across the whole market realized that the issue wasn't around mobility. Mobility was subsumed by this idea of 'any device, anywhere'. We're now starting to treat the desktop and the...

Smartphone Security: The Real Risk Behind Our Addiction to Apps

Smartphone Security: The Real Risk Behind Our Addiction to Apps

Laura Flack, head of digital safety at Barclays points out: “Everyone probably knows someone who has fallen victim to a fraudster. Crooks are using ever more sophisticated tactics to trick people into handing over their bank details or to pay money into a fraudster’s account when they believe they are simply paying their builder or solicitor. We need to super-charge our digital know how to...

Read on to know about smartphone security tips and mobile phone antivirus

Cyware provides expertly curated news on the entire paradigm of mobile security. Our smartphones have become an indispensable part of our lives. They contain almost every personal information of ours that includes sensitive information like online banking credentials and credit/debit card details, our personal photos and videos, our chats with friends, family and colleagues. Our phones are a goldmine for hackers with lots of information. So it is imperative for us to ensure our mobile phone security is robust and is extremely difficult for any hacker to crack. The responsibility lies on the us to keep our mobile device security framework updated and in sync with latest mobile protection standards. We cannot afford to follow archaic and obsolete security software and convince ourselves wrongly that we are well protected. Moreover, the cyber attacks on mobile phones are now increasing day by day. There is an increasing usage of Apps by the users. These Apps tend to collect sensitive information which puts our privacy at a grave risk.