Apple iOS Vulnerabilities – Zero Day Attacks

finjanmobileBlog, Mobile Security

Apple iOS Vulnerabilities

One week after Ivan Krstic, Apple’s head of security engineering and architecture offered a $50,000 “bug bounty” at the Black Hat security conference in August 2016 for zero-day vulnerabilities (security weaknesses discovered and exploited by attackers, but unknown to the system owner), some unknown iOS vulnerabilities came to light – and Apple’s mobile operating system came under serious attack. This … Read More

Android vs iOS – Which Platform is Better for Mobile Security?

finjanmobileBlog, Mobile Security

Android vs iOS

In a research report issued in March 2016, mobile phone manufacturers Nokia revealed that in terms of malware activity, smartphones have now overtaken laptops and desktop-based computer systems. Infections have plagued devices powered by both Google’s Android and Apple’s iOS operating platforms – although Android continues to be the principal target for the attentions of cyber-criminals. But which system truly … Read More

The Dangers of Using Unsecured Wi-Fi

finjanmobileBlog, Mobile Security

Unsecured Wi-Fi

Mention the words “public Wi-Fi”, and one of two things will probably happen – possibly, both. One: There’ll be a mad stampede of any mobile device users in the area to log in and pig out on the toll-free internet access. And, two: There’ll be a collective groan and shaking of heads, as any security professionals in the area contemplate … Read More

Decoy Apps – What Are They and What Role Do They Play?

finjanmobileBlog, Mobile Security

Decoy Apps

Having your mobile device fall into the wrong hands doesn’t always equate to “It was stolen.” Or hacked, for that matter. As smartphones, tablets, and other portable storage media gain in popularity, these devices are increasingly becoming our preferred repositories for photographs, video clips, private documents, and business or personal information. Allowing these resources and data to be viewed by … Read More

Mobile Device Authentication – A Look at Behavior-based Authentication

finjanmobileBlog, Mobile Security

Behavior-based Authentication

Though they’re growing to become as much a part of everyday life as the clothes we put on every morning, mobile devices are still looked upon as a useful appendage, rather than a vulnerable repository for our priceless personal data, financial information, photographs, and contacts. A 2014 study in the Symposium on Usable Privacy and Security (SOUPS) revealed that 57% … Read More

What is Bluesnarfing?

finjanmobileBlog, Mobile Security

bluesnarfing

Once touted as possibly the greatest thing since sliced bread, wireless Bluetooth technology has since gained a reputation as one of the gaping barriers in mobile and wireless device security – almost as bad as public WiFi. While it might be harsh to flatly dismiss the wireless technology that makes it possible for the visually or motion-impaired to enjoy the … Read More

Apps are Creating Mobile Security Vulnerabilities for IoT – How Bad is It?

finjanmobileBlog, Mobile Security

Mobile Security Vulnerabilities for IoT

In the corporate environment of today, Bring Your Own Device (BYOD) may extend beyond workers using their personal tablets and smartphones, to wearable devices like FitBits or Internet of Things (IoT)-connected badges and performance monitors. On the domestic or public scene, mobile devices are increasingly being supplemented by IoT tagged or sensor-laden goods, appliances, and infrastructure components. Office managers, home … Read More

Mobile Geo-Tagging

finjanmobileBlog, Mobile Security

Mobile Geo-Tagging

With the internet and wireless communications playing such a large part in our lives, there’s a lot of information around these days – and much of it is simply data about data. This metadata as it’s known describes not only resources, web pages, and database entries, but also objects – including some of the artifacts that we create every day. … Read More