Android/Chrome OS VPN Integration

finjanmobileBlog, Mobile Security

Android/Chrome OS VPN Integration

In their push to establish Chromebooks and Chrome OS as a market-leading alternative to popular desktop and laptop computer systems, Google has adopted a number of measures. One of these was to develop a Chrome extension which allowed Android apps to run on any device on which Chrome was installed – but this approach ran into some problems. Google’s alternative … Read More

How Big Companies Handle Your Mobile Data

finjanmobileBlog, Mobile Security

Mobile Data

As internet-enabled smartphones and tablets gain in popularity and spread, increasing numbers of people are using these devices to transact their personal and professional business online – either in preference to more traditional desktop and laptop computer systems, or in combination with them. Mobile internet users have to face a number of issues, which can be of either benefit or … Read More

Pros and Cons of Certificate Pinning in Endpoint Security

finjanmobileBlog, Mobile Security

Certificate Pinning

With smartphones, tablets, and other mobile devices assuming equal importance with connected hardware and desktop-based systems as viable ways of gaining access to corporate networks and the internet at large, security professionals are having to devote additional attention to keeping these portable “endpoints” safe – just like any other network resource. One way of doing this (which has been particularly … Read More

Bluetooth Trackers Used On Mobile Devices

finjanmobileBlog, Mobile Security

Bluetooth Trackers

These days, the definition of a “mobile device” is broad enough to encompass a diverse range of consumer goods and accessories, ranging from notebook and small laptop computers (they’re portable by hand, therefore mobile), to phones, smart cards, tags, key fobs, badges, or tokens. Most (but not necessarily all) bear some form of digital/electronic circuitry. And like other small items … Read More

Protecting Mobile Data From AI Scraping

finjanmobileBlog, Mobile Security

AI Scraping

With personal data, spending habits, demographic, behavioral, and other information being routinely stored on mobile devices, cell phone and other mobile users are already concerned over how this potentially valuable and/or damaging material is being observed and gathered by government, law enforcement agencies, software developers, and advertising networks. What many users may not be aware of is that AI has … Read More

Boosting Cell Phone Privacy

finjanmobileBlog, Mobile Security

cell phone privacy

Issues concerning digital security and cell phone privacy have been thrust into the spotlight in recent weeks, as fresh hacks are exposed, and new legislation comes into play in various corners of the globe. With avenues and points of contact with the digital realm ever on the increase, there are opportunities for personal and corporate data to become exposed to … Read More

How Anonymous Browsing Data Can Be Exposed

finjanmobileBlog, Mobile Security

anonymous browsing data

Each day, we access the internet for any number of reasons, uploading and downloading information which captured on its own or read in context with other data could be used to provide a comprehensive profile of our identities and activities to personal or business rivals, spies and investigators, or cyber-criminals of all kinds. It’s for this reason that security professionals … Read More

How Data Retention Legislation Impacts VPN Providers for the Better

finjanmobileBlog, Mobile Security

Data Retention and VPN

Virtual Private Networks or VPNs are often recommended to users of the internet and unsecured wireless networks, as a way of safeguarding their identities and information from the combined threats of snooping, hacking, and data interception. VPN applications and subscription-based services have enjoyed moderate success, to date. But with the introduction or increased enforcement of data retention legislation in various … Read More

Mobile Devices and Blockchain Technology

finjanmobileBlog, Mobile Security

Blockchain

New and evolving technologies like Voice over Internet Protocol (VoIP), 5G networks, Artificial Intelligence (AI), and WebRTC (Web Real Time Communication) have the potential to radically alter the speed and manner in which we interact with mobile devices, the internet, and the world at large. One emerging field that’s already having an impact in financial circles – and one with … Read More

How to Protect Your Privacy in the Mobile Age

finjanmobileBlog, Mobile Security

mobile privacy

In an era where a chip the size of a human thumbnail may hold as much information as entire civilizations gathered in ages past, we’ve grown accustomed to having a wealth of data at our fingertips, and the world in the palms of our hands. There’s a single strand of technology that makes both these conditions possible: The smartphone, and … Read More