Mobile Security

Cybercriminals are attracted by the richness of data available from our mobile devices, such as banking credentials, photos, and personal information. That is why we put security at your fingertips providing peace of mind to you. Read more about mobile security to help you stay safe, particularly on-the-go.

The iOS Twitter Bug: 3 Tips to Protect Your Location Data
Many of us use social media to keep our family and friends up-to-date on our everyday lives. We don’t typically...
On Mother’s Day, Show Your Love for Your Mom by Introducing Her to Helpful Apps
A mobile chat with my mother usually goes off like this: “Hello! Can you hear me! I...
#Verified — Worth the Risk?
Celebrities, brands, and famous pets alike have verified Instagram accounts – but what happens when cybercriminals get involved?
Wi-Fi Woes: Android Hotspot App Leaves 2 Million Passwords Exposed
Logging onto a free Wi-Fi network can be tempting, especially when you’re out running errands or waiting to catch a...
Something’s Phishy With the Instagram “HotList”
Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages...
The “Nasty List” Phishing Scam Is out to Steal Your Instagram Login
How often do you check your social media accounts? According to a recent study, internet users spend an average of...
From Internet to Internet of Things
Thirty years ago, Tim Berners-Lee set out to accomplish an ambitious idea – the World Wide Web. An idea that...
What’s in Your IoT Cybersecurity Kit?
With IoT devices proliferating every aspect of day to day life, it’s no wonder IoT-based attacks are becoming smarter and...
Teen Texting Slang (and Emojis) Parents Should Know
While teen texting slang is perfectly understood peer-to-peer, it has parents googling like crazy to decipher it. Here's a list...
iOS Users: Update Your Software to Avoid Security Vulnerabilities
On Monday, Apple made some bold announcements at their keynote event, including new subscription offerings for news, television, video games,...
Social Media: Where Cybercrime Lurks in the Shadows
When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating...
Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home
Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open...
169 - 180 of 444
Back to top