You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connected mobile world, there are a variety of ways to get and stay connected to the Internet, but what’s really the safest way?
Truth be told, nothing is 100% safe. However, there are ways that you can beef up your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.
How Do Mobile Devices Connect to the Internet?
Let’s break down the three different ways your mobile device can connect to the Internet, and...
The mobile apps we use can provide other parties access to our information and everything on our devices. Our smart devices are powerful computers, containing valuable information, such as passwords, contacts, phone numbers, photos, videos, and maybe even banking details. Thus, it’s very important to understand the privacy and security implications that come with using any app. Guard your information by exercising caution and by taking three simple steps.
Sure, downloading apps from third-party sites—i.e. not the Apple Store, Android Market, or Blackberry App World—can be all kinds of tempting. However, to do so is to put your device, and therefore yourself, at risk.
What Third-Party App Stores Do
Dangerous third-party app stores work via malicious advertising or even code. The ads or codes are “injected” into popular apps users purchase through these stores instead of legitimate options. While not all third-party apps are “bad,” many stores bait users by offering popular apps for much cheaper prices, and subsequently put user privacy ver...
Whether you’re a regular business traveler, or a high-tech adventurer seeker, traveling—particularly abroad—poses unique cyber security threats. Business travelers are especially vulnerable because they often carry sensitive data, both personal and business related, on a variety of devices including smartphone, laptops, and tablet.
Don’t cancel your travel plans just yet. Here are eight cyber security tips for business travelers that are also great tips for anyone planning a holiday abroad:
1. Lock Devices Down
Most smartphones, laptops, and tablets come equipped with security settin...
It’s happened to most of us. That urge to look at your phone has become a part of everyday life. Maybe you are expecting a phone call, or perhaps you want to know how many ‘likes’ that picture of your cat has earned. Maybe it’s just that fix your life needs at that moment that only a smartphone can give you. You rummage through your pocket to find it with no luck. Perhaps it’s in the other one. Nope. You try your bag. Nope, again. You break into a sweat.
After what seems like an eternity, you come to the crushing realization that you have lost one of the most valuable material possessions...
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information. They know most people don’t read the Terms of Service, so their Terms of Service include language authorizing a massive invasion of your privacy. At the same time, you might have noticed that most Terms of Service is just boilerplate. How do you read the Terms of Service and find out what you need to know about privacy without...
You don’t have to be a super geek to protect yourself from cyber criminals and hackers. Sure they might know more about computers and software than you do. However, there are basic defenses available to help you stand up against even the most sophisticated online threats.
Today, most of us have multiple devices to access the Internet. All of these devices create a latticework of information that links to you personally. If one device is unprotected, it could be compromised in a way that affects all the others. That’s because most of us use different devices to access many of the same pers...
The security argument between Apple’s iOS and Google’s Android system for smartphones is heating up yet again. In a recent study conducted by Daniel R. Thomas, Alastair R. Beresford, and Andrew Rice at the University of Cambridge, research concluded that 90 percent of Android devices are exposed to at least one critical vulnerability.
The threat model was constructed using three common attack vectors: installation attack (malicious codes installed through app download); dynamic code loading (an existing app downloads new malicious codes); and injection (an attacker injects malicious code...
An unfortunate number of women are becoming victims of cyber crimes. According to a recent study more women are known to use the Internet to enrich their relationships compared to men. Young women, those 18-24, experience certain severe types of harassment at disproportionately high levels: 26% of these young women have been stalked online, and 25% were the target of online sexual harassment. The growing reach of the Internet and the rapid spread of information through mobile devices has presented new opportunities that could put some women at risk, so it’s important to be mindful of the...
There are few times your smartphone or tablet will be more at risk than when you go on vacation. Although these items have been specifically designed to accompany you on your travels, they’re full of personal information that can put you, your finances, and your personal property at risk.
There’s no reason to assume the worst when you go on vacation, but you can greatly reduce your chances of a security breach by preparing your smartphone or tablet ahead of time and remaining vigilant while on your trip. Here’s how to prepare a smartphone or tablet before you go on vacation.
As the saying goes, it’s a new year, a new you. Around this time of year, people tend to reflect on the past 365 days and look towards improvement. While New Years Resolutions seem to be a longstanding tradition, how we go about them has changed greatly in the digital age. We now live in a world where we have access to just about anything imaginable on our devices. We receive texts from our loved ones, reminders from our calendars and we can even order groceries at our fingertips. It only seems logical that the next step with this tech is to help us to achieve our goals. However helpful t...
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. It’s easier than ever to send money to the people who need it, but also easier than ever for hackers to gain access to that money before it gets where you want it. How do you keep yourself and your money safe, while also being able to access the convenience of mobile payment apps?
How Mobile Payment Apps Work
You can pay using your phone, even without apps. Some companies, such as your phone company, allow you to pay your bill using standard text messaging....