As we increasingly make use of our smartphones to satisfy our shopping needs, let’s shine a light on how these hubs of our digital lives can be used to shop securely, on and around a day dedicated to online deals. Let’s get a bit statistical first. On Cyber Monday in 2017, smartphones and tablets accounted … More Smartphone shopping: Avoid the blues on Cyber Monday
For Android, malware detections were down 27% compared to the first half of 2017; for iOS, they decreased 15% compared to the same period last year. Mobile security plays an increasingly important role in the protection of information assets, and this applies to both home and corporate users. So, this publication will focus on analyzing the … More Semi-annual balance of mobile security
Two-factor authentication is an underutilized security measure in businesses, yet it can greatly improve the security of an account. it is also recommended as one of the key factors in helping keep data secure in compliance with GDPR. Receiving an extra code to your phone when signing in, is a great obstacle for would-be hackers … More Google Gmail’s Two-Factor Authentication. Know how to set it up? It’s easy!
Tricksters have been misleading users about the functionality of apps by displaying bogus download numbers. It seems that tricksters on Google Play have found another way to make their deceptive apps appear more trustworthy to users – that is, at least at first sight. The trick takes advantage of the fact that apart from the app icon … More Android users: Beware these popularity-faking tricks on Google Play
The importance of providing the best possible after-sales service to customers. L’appel du vide is an expression meaning “the call of the void”, with a similar meaning to what Poe called The Imp of the Perverse: you might define it informally as the sudden irresistible urge to do something harmful, to oneself or perhaps to others. I … More Tech support scams and the call of the void
While analysts figure out new methodologies for analyzing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices. The convoluted tricks used to increase the effectiveness of their attacks can be grouped into two distinct categories: First, Social Engineering strategies that seek to … More Tricks that cybercriminals use, to hide in your phone
If you’re reading this article, it’s likely that you’re hoping for quick tips on what to do if you suspect there’s spyware or a tracker on your phone. If that is the case, you’re likely to be disappointed; there are no quick lists of things to identify or remove to make you safe again. But … More Think you have a tracker on your phone? Learn how to make your device more resilient