With data privacy scandals like the Cambridge Analytica affair hitting the news on an almost daily basis, people are getting used to the idea that their online user profile data is being routinely captured and shared with third parties. But as increasing numbers of users move away from desktop and laptop computers as their primary means of internet access, what … Read More
Fraudulent Transactions on Mobile Apps Are a Growing Concern
In a report analyzing consumer fraud data for the first quarter of 2018, RSA Security disclosed that the number of fraudulent transactions on mobile apps has risen by over 600%, since 2015. Some 39% of all fraudulent transactions conducted during the quarter were carried out via mobile apps. Why is this happening, and what can be done to prevent it … Read More
The Dangers of Using Unsecured Wi-Fi
Mention the words “public Wi-Fi”, and one of two things will probably happen – possibly, both. One: There’ll be a mad stampede of any mobile device users in the area to log in and pig out on the toll-free internet access. And, two: There’ll be a collective groan and shaking of heads, as any security professionals in the area contemplate … Read More
Mobile Security Tips – How to Slow Down Hackers from Targeting You
A 2016 report on mobile security by Intertrust estimates that the cost of mobile application hacks and data breaches will reach $1.5 billion by 2021. Despite this very real threat, only $2 million is spent annually on mobile app security, as compared to the $34 million spent each year on developing mainstream apps. We routinely spend a lot of time, … Read More
How Big Companies Handle Your Mobile Data
As internet-enabled smartphones and tablets gain in popularity and spread, increasing numbers of people are using these devices to transact their personal and professional business online – either in preference to more traditional desktop and laptop computer systems, or in combination with them. Mobile internet users have to face a number of issues, which can be of either benefit or … Read More
Pros and Cons of Certificate Pinning in Endpoint Security
With smartphones, tablets, and other mobile devices assuming equal importance with connected hardware and desktop-based systems as viable ways of gaining access to corporate networks and the internet at large, security professionals are having to devote additional attention to keeping these portable “endpoints” safe – just like any other network resource. One way of doing this (which has been particularly … Read More
Protecting Mobile Data From AI Scraping
With personal data, spending habits, demographic, behavioral, and other information being routinely stored on mobile devices, cell phone and other mobile users are already concerned over how this potentially valuable and/or damaging material is being observed and gathered by government, law enforcement agencies, software developers, and advertising networks. What many users may not be aware of is that AI has … Read More
Boosting Cell Phone Privacy
Issues concerning digital security and cell phone privacy have been thrust into the spotlight in recent weeks, as fresh hacks are exposed, and new legislation comes into play in various corners of the globe. With avenues and points of contact with the digital realm ever on the increase, there are opportunities for personal and corporate data to become exposed to … Read More
How Anonymous Browsing Data Can Be Exposed
Each day, we access the internet for any number of reasons, uploading and downloading information which captured on its own or read in context with other data could be used to provide a comprehensive profile of our identities and activities to personal or business rivals, spies and investigators, or cyber-criminals of all kinds. It’s for this reason that security professionals … Read More
How Data Retention Legislation Impacts VPN Providers for the Better
Virtual Private Networks or VPNs are often recommended to users of the internet and unsecured wireless networks, as a way of safeguarding their identities and information from the combined threats of snooping, hacking, and data interception. VPN applications and subscription-based services have enjoyed moderate success, to date. But with the introduction or increased enforcement of data retention legislation in various … Read More
- Page 1 of 2
- 1
- 2