Mobile Devices and Blockchain Technology

finjanmobileBlog, Mobile Security

Blockchain

New and evolving technologies like Voice over Internet Protocol (VoIP), 5G networks, Artificial Intelligence (AI), and WebRTC (Web Real Time Communication) have the potential to radically alter the speed and manner in which we interact with mobile devices, the internet, and the world at large. One emerging field that’s already having an impact in financial circles – and one with … Read More

How to Protect Your Privacy in the Mobile Age

finjanmobileBlog, Mobile Security

mobile privacy

In an era where a chip the size of a human thumbnail may hold as much information as entire civilizations gathered in ages past, we’ve grown accustomed to having a wealth of data at our fingertips, and the world in the palms of our hands. There’s a single strand of technology that makes both these conditions possible: The smartphone, and … Read More

Apple iOS Vulnerabilities – Zero Day Attacks

finjanmobileBlog, Mobile Security

Apple iOS Vulnerabilities

One week after Ivan Krstic, Apple’s head of security engineering and architecture offered a $50,000 “bug bounty” at the Black Hat security conference in August 2016 for zero-day vulnerabilities (security weaknesses discovered and exploited by attackers, but unknown to the system owner), some unknown iOS vulnerabilities came to light – and Apple’s mobile operating system came under serious attack. This … Read More

Android vs iOS – Which Platform is Better for Mobile Security?

finjanmobileBlog, Mobile Security

Android vs iOS

In a research report issued in March 2016, mobile phone manufacturers Nokia revealed that in terms of malware activity, smartphones have now overtaken laptops and desktop-based computer systems. Infections have plagued devices powered by both Google’s Android and Apple’s iOS operating platforms – although Android continues to be the principal target for the attentions of cyber-criminals. But which system truly … Read More

Decoy Apps – What Are They and What Role Do They Play?

finjanmobileBlog, Mobile Security

Decoy Apps

Having your mobile device fall into the wrong hands doesn’t always equate to “It was stolen.” Or hacked, for that matter. As smartphones, tablets, and other portable storage media gain in popularity, these devices are increasingly becoming our preferred repositories for photographs, video clips, private documents, and business or personal information. Allowing these resources and data to be viewed by … Read More

Mobile Device Authentication – A Look at Behavior-based Authentication

finjanmobileBlog, Mobile Security

Behavior-based Authentication

Though they’re growing to become as much a part of everyday life as the clothes we put on every morning, mobile devices are still looked upon as a useful appendage, rather than a vulnerable repository for our priceless personal data, financial information, photographs, and contacts. A 2014 study in the Symposium on Usable Privacy and Security (SOUPS) revealed that 57% … Read More

What is Bluesnarfing?

finjanmobileBlog, Mobile Security

bluesnarfing

Once touted as possibly the greatest thing since sliced bread, wireless Bluetooth technology has since gained a reputation as one of the gaping barriers in mobile and wireless device security – almost as bad as public WiFi. While it might be harsh to flatly dismiss the wireless technology that makes it possible for the visually or motion-impaired to enjoy the … Read More

Apps are Creating Mobile Security Vulnerabilities for IoT – How Bad is It?

finjanmobileBlog, Mobile Security

Mobile Security Vulnerabilities for IoT

In the corporate environment of today, Bring Your Own Device (BYOD) may extend beyond workers using their personal tablets and smartphones, to wearable devices like FitBits or Internet of Things (IoT)-connected badges and performance monitors. On the domestic or public scene, mobile devices are increasingly being supplemented by IoT tagged or sensor-laden goods, appliances, and infrastructure components. Office managers, home … Read More