Mobile Content Distribution – How Technology Is Quickly Changing Everything

finjanmobileBlog, Mobile Technology

Mobile Content Distribution

“Nobody reads books, anymore.” “Print is dead.” “Cinema is dead.” As technologies evolve and social habits change, we’ve seen one method give way to another, in the way we consume what’s now collectively known as “content”: Text, photographs, animation, video clips, feature films, music, etc. The latest trend is for small screens and digital streaming on hand-held or portable devices … Read More

How Data Retention Legislation Impacts VPN Providers for the Better

finjanmobileBlog, Mobile Security

Data Retention and VPN

Virtual Private Networks or VPNs are often recommended to users of the internet and unsecured wireless networks, as a way of safeguarding their identities and information from the combined threats of snooping, hacking, and data interception. VPN applications and subscription-based services have enjoyed moderate success, to date. But with the introduction or increased enforcement of data retention legislation in various … Read More

Mobile Devices and Blockchain Technology

finjanmobileBlog, Mobile Security

Blockchain

New and evolving technologies like Voice over Internet Protocol (VoIP), 5G networks, Artificial Intelligence (AI), and WebRTC (Web Real Time Communication) have the potential to radically alter the speed and manner in which we interact with mobile devices, the internet, and the world at large. One emerging field that’s already having an impact in financial circles – and one with … Read More

How to Protect Your Privacy in the Mobile Age

finjanmobileBlog, Mobile Security

mobile privacy

In an era where a chip the size of a human thumbnail may hold as much information as entire civilizations gathered in ages past, we’ve grown accustomed to having a wealth of data at our fingertips, and the world in the palms of our hands. There’s a single strand of technology that makes both these conditions possible: The smartphone, and … Read More

Apple iOS Vulnerabilities – Zero Day Attacks

finjanmobileBlog, Mobile Security

Apple iOS Vulnerabilities

One week after Ivan Krstic, Apple’s head of security engineering and architecture offered a $50,000 “bug bounty” at the Black Hat security conference in August 2016 for zero-day vulnerabilities (security weaknesses discovered and exploited by attackers, but unknown to the system owner), some unknown iOS vulnerabilities came to light – and Apple’s mobile operating system came under serious attack. This … Read More

Android vs iOS – Which Platform is Better for Mobile Security?

finjanmobileBlog, Mobile Security

Android vs iOS

In a research report issued in March 2016, mobile phone manufacturers Nokia revealed that in terms of malware activity, smartphones have now overtaken laptops and desktop-based computer systems. Infections have plagued devices powered by both Google’s Android and Apple’s iOS operating platforms – although Android continues to be the principal target for the attentions of cyber-criminals. But which system truly … Read More

The Dangers of Using Unsecured Wi-Fi

finjanmobileBlog, Mobile Security

Unsecured Wi-Fi

Mention the words “public Wi-Fi”, and one of two things will probably happen – possibly, both. One: There’ll be a mad stampede of any mobile device users in the area to log in and pig out on the toll-free internet access. And, two: There’ll be a collective groan and shaking of heads, as any security professionals in the area contemplate … Read More

Decoy Apps – What Are They and What Role Do They Play?

finjanmobileBlog, Mobile Security

Decoy Apps

Having your mobile device fall into the wrong hands doesn’t always equate to “It was stolen.” Or hacked, for that matter. As smartphones, tablets, and other portable storage media gain in popularity, these devices are increasingly becoming our preferred repositories for photographs, video clips, private documents, and business or personal information. Allowing these resources and data to be viewed by … Read More