How User Profile Data is Being Captured And Shared Over Mobile

finjanmobileBlog, Mobile Security

user profile data

With data privacy scandals like the Cambridge Analytica affair hitting the news on an almost daily basis, people are getting used to the idea that their online user profile data is being routinely captured and shared with third parties. But as increasing numbers of users move away from desktop and laptop computers as their primary means of internet access, what … Read More

Fraudulent Transactions on Mobile Apps Are a Growing Concern

finjanmobileBlog, Mobile Security

Fraudulent Transactions on Mobile Apps

In a report analyzing consumer fraud data for the first quarter of 2018, RSA Security disclosed that the number of fraudulent transactions on mobile apps has risen by over 600%, since 2015. Some 39% of all fraudulent transactions conducted during the quarter were carried out via mobile apps. Why is this happening, and what can be done to prevent it … Read More

The Dangers of Using Unsecured Wi-Fi

finjanmobileBlog, Mobile Security

Unsecured Wi-Fi

Mention the words “public Wi-Fi”, and one of two things will probably happen – possibly, both. One: There’ll be a mad stampede of any mobile device users in the area to log in and pig out on the toll-free internet access. And, two: There’ll be a collective groan and shaking of heads, as any security professionals in the area contemplate … Read More

Mobile Security Tips – How to Slow Down Hackers from Targeting You

finjanmobileBlog, Mobile Security

Mobile Security Tips

A 2016 report on mobile security by Intertrust estimates that the cost of mobile application hacks and data breaches will reach $1.5 billion by 2021. Despite this very real threat, only $2 million is spent annually on mobile app security, as compared to the $34 million spent each year on developing mainstream apps. We routinely spend a lot of time, … Read More

How Big Companies Handle Your Mobile Data

finjanmobileBlog, Mobile Security

Mobile Data

As internet-enabled smartphones and tablets gain in popularity and spread, increasing numbers of people are using these devices to transact their personal and professional business online – either in preference to more traditional desktop and laptop computer systems, or in combination with them. Mobile internet users have to face a number of issues, which can be of either benefit or … Read More

Pros and Cons of Certificate Pinning in Endpoint Security

finjanmobileBlog, Mobile Security

Certificate Pinning

With smartphones, tablets, and other mobile devices assuming equal importance with connected hardware and desktop-based systems as viable ways of gaining access to corporate networks and the internet at large, security professionals are having to devote additional attention to keeping these portable “endpoints” safe – just like any other network resource. One way of doing this (which has been particularly … Read More

Protecting Mobile Data From AI Scraping

finjanmobileBlog, Mobile Security

AI Scraping

With personal data, spending habits, demographic, behavioral, and other information being routinely stored on mobile devices, cell phone and other mobile users are already concerned over how this potentially valuable and/or damaging material is being observed and gathered by government, law enforcement agencies, software developers, and advertising networks. What many users may not be aware of is that AI has … Read More

Boosting Cell Phone Privacy

finjanmobileBlog, Mobile Security

cell phone privacy

Issues concerning digital security and cell phone privacy have been thrust into the spotlight in recent weeks, as fresh hacks are exposed, and new legislation comes into play in various corners of the globe. With avenues and points of contact with the digital realm ever on the increase, there are opportunities for personal and corporate data to become exposed to … Read More

How Anonymous Browsing Data Can Be Exposed

finjanmobileBlog, Mobile Security

anonymous browsing data

Each day, we access the internet for any number of reasons, uploading and downloading information which captured on its own or read in context with other data could be used to provide a comprehensive profile of our identities and activities to personal or business rivals, spies and investigators, or cyber-criminals of all kinds. It’s for this reason that security professionals … Read More

How Data Retention Legislation Impacts VPN Providers for the Better

finjanmobileBlog, Mobile Security

Data Retention and VPN

Virtual Private Networks or VPNs are often recommended to users of the internet and unsecured wireless networks, as a way of safeguarding their identities and information from the combined threats of snooping, hacking, and data interception. VPN applications and subscription-based services have enjoyed moderate success, to date. But with the introduction or increased enforcement of data retention legislation in various … Read More