Thanks to The Zebra for this infographic.Continue Reading →
A lot of very specific location information is being collected about you, me, and every other smartphone user. The image at left shows everywhere I have been in the last four years, courtesy of Google location services. If you would like to find out what is being collected about you, and how to make it stop, the last article and this article will ...Continue Reading →
A lot of very specific location information is being collected about you, me, and every other smartphone user. The image at left shows everywhere I have been in the last four years, courtesy of Google location services. If you would like to find out what is being collected about you, and how to make it stop, the next two articles will help. Today ...Continue Reading →
The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones. Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone.
Stalkerware is not limited to Android phones. It can be installed ...Continue Reading →
The powerful Anubis banking Trojan is showing up in the Google Play Store in other apps. Currently, Anubis is masquerading as a battery saver and currency converter. This Android banking Trojan launches a fake app overlay screen when the user opens the app. The user enters his or her account credentials into the fake overlay, which allows the Anubis malware to steal the data. Anubis can imitate 377 financial apps used ...Continue Reading →
Your web browser collects data about you and shares it with the websites you visit. Your smartphone collects a ton of data about you and some of it goes to the carrier, but most of it is sold to data brokers by the developers of all those “free” apps you installed. You car is collecting data about you too. Where you go, how ...Continue Reading →
Microsoft has announced some big changes that will finally give Windows users more control over updates and releases.
Mozilla doesn’t ...Continue Reading →
The climate around mobile app security is heating up.
Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.
In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.
Starting in December of 2017, TimeHop was ...Continue Reading →
Add this latest public warning system sabotage to a growing list of fear-and-panic-spreading hacking incidents.
Nudies, taxes, and memos – oh, my! Research shows that even if we think we’ve deleted content on the sticks, we’re leaving all ...Continue Reading →
It’s something that we hear a lot about – mobile devices have become an integral part of our society. Can you remember the last time that you switched your phone off for the weekend? Can you even imagine not having your phone with you all the time? If you’re like most people, the idea is ludicrous. We keep everything on our phones.
It’s convenient for us – you don’t have to boot ...Continue Reading →