How to Protect Your Privacy in the Mobile Age

finjanmobileBlog, Mobile Security

mobile privacy

In an era where a chip the size of a human thumbnail may hold as much information as entire civilizations gathered in ages past, we’ve grown accustomed to having a wealth of data at our fingertips, and the world in the palms of our hands. There’s a single strand of technology that makes both these conditions possible: The smartphone, and … Read More

Apple iOS Vulnerabilities – Zero Day Attacks

finjanmobileBlog, Mobile Security

Apple iOS Vulnerabilities

One week after Ivan Krstic, Apple’s head of security engineering and architecture offered a $50,000 “bug bounty” at the Black Hat security conference in August 2016 for zero-day vulnerabilities (security weaknesses discovered and exploited by attackers, but unknown to the system owner), some unknown iOS vulnerabilities came to light – and Apple’s mobile operating system came under serious attack. This … Read More

Android vs iOS – Which Platform is Better for Mobile Security?

finjanmobileBlog, Mobile Security

Android vs iOS

In a research report issued in March 2016, mobile phone manufacturers Nokia revealed that in terms of malware activity, smartphones have now overtaken laptops and desktop-based computer systems. Infections have plagued devices powered by both Google’s Android and Apple’s iOS operating platforms – although Android continues to be the principal target for the attentions of cyber-criminals. But which system truly … Read More

Mobile Device Authentication – A Look at Behavior-based Authentication

finjanmobileBlog, Mobile Security

Behavior-based Authentication

Though they’re growing to become as much a part of everyday life as the clothes we put on every morning, mobile devices are still looked upon as a useful appendage, rather than a vulnerable repository for our priceless personal data, financial information, photographs, and contacts. A 2014 study in the Symposium on Usable Privacy and Security (SOUPS) revealed that 57% … Read More