Bluetooth Trackers Used On Mobile Devices

finjanmobileBlog, Mobile Security

Bluetooth Trackers

These days, the definition of a “mobile device” is broad enough to encompass a diverse range of consumer goods and accessories, ranging from notebook and small laptop computers (they’re portable by hand, therefore mobile), to phones, smart cards, tags, key fobs, badges, or tokens. Most (but not necessarily all) bear some form of digital/electronic circuitry. And like other small items … Read More

Mobile Content Distribution – How Technology Is Quickly Changing Everything

finjanmobileBlog, Mobile Technology

Mobile Content Distribution

“Nobody reads books, anymore.” “Print is dead.” “Cinema is dead.” As technologies evolve and social habits change, we’ve seen one method give way to another, in the way we consume what’s now collectively known as “content”: Text, photographs, animation, video clips, feature films, music, etc. The latest trend is for small screens and digital streaming on hand-held or portable devices … Read More

Mobile Geo-Tagging

finjanmobileBlog, Mobile Security

Mobile Geo-Tagging

With the internet and wireless communications playing such a large part in our lives, there’s a lot of information around these days – and much of it is simply data about data. This metadata as it’s known describes not only resources, web pages, and database entries, but also objects – including some of the artifacts that we create every day. … Read More

Mobile Device Ad Tracking

finjanmobileBlog, Mobile Security

Mobile Device Ad Tracking

In a lofty-sounding process known as state management, administrators of web sites and search engines can optimize the online experience on your desktop or laptop computer’s browser through the use of cookies, which are little text files stored in your browser caches recording your user IDs, passwords, personalized themes, and other preferences. It’s achieved simply enough. But for mobile devices … Read More

Protecting Sensitive Data on Your Mobile Device

finjanmobileBlog, Mobile Security

Protecting Sensitive Data on Your Mobile Device

A 2015 survey of 2,000 office workers revealed that 73% of those polled had downloaded personal apps to tablets issued by their employers, while over 50% used their personal smartphones and devices to conduct company business. With the lines now blurred between personal and corporate, the data stored and transmitted on mobile devices is often a mix of personally identifiable … Read More

Human Behavior – the Achilles Heel in Mobile Security

finjanmobileBlog, Mobile Security

Human Behavior - the Achilles Heel in Mobile Security

The continued success of email phishing attempts and social engineering tactics, and the growing efficiency of the emerging breeds of mobile malware all attest to a fact that security professionals have been moaning about for years: Human beings (in this case, mobile device users) are the single most effective tool that cyber-criminals have in compromising security. In classical Greek mythology, … Read More