Tagged: mobile apps

identity

Tips to Protect Your Digital Identity

Within the last decade, our senses of self and identity have made a major shift.  Whether we’ve noticed it or not, the items that used to define our identities have gone from hard copy items, such as birth certificates and Social Security cards, to online banking passwords, Facebook logins, and mobile wallets stored in our smartphones.  While we still need to safeguard and protect those hard copy documents, we also have to focus on our digital identities.

mobileidentitythefts

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips!

WiFi Calling Mobile

Are Phone Calls Over WiFi Hotspots Safe from Hackers?

You might have heard that the new iPhone 6 supports making phone calls over WiFi networks. Using WiFi networks to make calls is the next big thing for mobile phones.

But how safe is it to make phone calls using public WiFi hotspots? Are your calls being encrypted? And should you take any steps to protect yourself from WiFi hackers? Read on to find out more.

Screen-Shot-2014-09-15-at-1.11s

Infographic: Protecting Yourself and Your Mobile Device

While most people secure their laptops with the latest security updates, there’s still a large segment of society who seems to think security issues do not affect their mobile phones.
An infographic designed by a company called Crowd Control HQ aims to protect everyone’s mobile device — but they forgot one very important security tip!

Keep reading to learn more.

man-in-the-middles

Android Apps Susceptible to Man-in-the-Middle Attacks

With a man-in-the-middle attack, your app thinks it is communicating with the app’s web server, but in fact, all of your personal information is being sent directly to the hacker’s computer. Keep reading for details on the two kinds of SSL vulnerabilities that FireEye found in some of the most popular Android apps — and how to protect yourself today.

shutterstock_139696714s

Mobile Threats: What You Need to Know About Mobile Payment Risks and Responsibilities

As we continue to rely on the precarious mix of mobile banking & payments, mobile apps, and public WiFi hotspots, it’s perhaps not such a surprise that online bank fraud is escalating. Quite a bit of this fraud is perpetrated by malicious apps that users inadvertently download on their mobile devices. App developers with malicious intent have become quite adept at concealing the surreptitious nature of these apps.

apples

Apple’s iOS 8 Operating System Strikes a Blow for Privacy

Apple’s new operating system, iOS 8, has made it much harder for marketers to track your cell phone, and thus harder to track you.

While this is undoubtedly a good move for those concerned with protecting their privacy, others have raised concerns that Apple may be doing this to push their own tracking technology, iBeacon.

keysmartphones

Centrify Survey Reveals Some of Us Think Mobile Security is Not Our Problem

If you are accessing corporate or sensitive data on your mobile phone, you should use a VPN like PRIVATE WiFi to protect your communications. But some people are not taking steps to protect that data, according to a new survey. The most disturbing findings? 15% of employees say they feel “minimal to no” responsibility to protect corporate data stored on their mobile devices. And 10% do not have any password, PIN, or other security measures in place to protect their mobile devices they use for work purposes.

facebook nearby friends

Facebook’s Nearby Friends: Building ‘IRL’ Connections While Undermining Your Privacy

Nearly two years ago we reported that Facebook was planning to launch a new feature that would help users locate their friends “In Real Life.” And now “Nearby Friend” is a reality, allowing mobile users to see which of their contacts is in their current vicinity. This tool is optional, and you can also set it for specific groups of friends.

Before turning it on, let’s take a deeper look into the privacy repercussions of using the feature.

wearabletech1s

Why You Should Worry About Wearable Tech and Wireless Security

They track our movements, monitor our health, and record where we’ve been and what we’ve seen.  They’re wearable computing devices – one of the hottest trends in tech today. According to a 2013 Nielsen survey, 15% of U.S. consumers already own and use some form of wearables – everything from smart watches and fitness bands to glasses that record video.

So before you don that wearable tech, read on and consider how your data could be exploited.