Bluetooth Trackers Used On Mobile Devices

finjanmobileBlog, Mobile Security

Bluetooth Trackers

These days, the definition of a “mobile device” is broad enough to encompass a diverse range of consumer goods and accessories, ranging from notebook and small laptop computers (they’re portable by hand, therefore mobile), to phones, smart cards, tags, key fobs, badges, or tokens. Most (but not necessarily all) bear some form of digital/electronic circuitry. And like other small items … Read More

Boosting Cell Phone Privacy

finjanmobileBlog, Mobile Security

cell phone privacy

Issues concerning digital security and cell phone privacy have been thrust into the spotlight in recent weeks, as fresh hacks are exposed, and new legislation comes into play in various corners of the globe. With avenues and points of contact with the digital realm ever on the increase, there are opportunities for personal and corporate data to become exposed to … Read More

Mobile Content Distribution – How Technology Is Quickly Changing Everything

finjanmobileBlog, Mobile Technology

Mobile Content Distribution

“Nobody reads books, anymore.” “Print is dead.” “Cinema is dead.” As technologies evolve and social habits change, we’ve seen one method give way to another, in the way we consume what’s now collectively known as “content”: Text, photographs, animation, video clips, feature films, music, etc. The latest trend is for small screens and digital streaming on hand-held or portable devices … Read More

How to Protect Your Privacy in the Mobile Age

finjanmobileBlog, Mobile Security

mobile privacy

In an era where a chip the size of a human thumbnail may hold as much information as entire civilizations gathered in ages past, we’ve grown accustomed to having a wealth of data at our fingertips, and the world in the palms of our hands. There’s a single strand of technology that makes both these conditions possible: The smartphone, and … Read More

Apple iOS Vulnerabilities – Zero Day Attacks

finjanmobileBlog, Mobile Security

Apple iOS Vulnerabilities

One week after Ivan Krstic, Apple’s head of security engineering and architecture offered a $50,000 “bug bounty” at the Black Hat security conference in August 2016 for zero-day vulnerabilities (security weaknesses discovered and exploited by attackers, but unknown to the system owner), some unknown iOS vulnerabilities came to light – and Apple’s mobile operating system came under serious attack. This … Read More

Android vs iOS – Which Platform is Better for Mobile Security?

finjanmobileBlog, Mobile Security

Android vs iOS

In a research report issued in March 2016, mobile phone manufacturers Nokia revealed that in terms of malware activity, smartphones have now overtaken laptops and desktop-based computer systems. Infections have plagued devices powered by both Google’s Android and Apple’s iOS operating platforms – although Android continues to be the principal target for the attentions of cyber-criminals. But which system truly … Read More

Mobile Geo-Tagging

finjanmobileBlog, Mobile Security

Mobile Geo-Tagging

With the internet and wireless communications playing such a large part in our lives, there’s a lot of information around these days – and much of it is simply data about data. This metadata as it’s known describes not only resources, web pages, and database entries, but also objects – including some of the artifacts that we create every day. … Read More

Mobile Device Ad Tracking

finjanmobileBlog, Mobile Security

Mobile Device Ad Tracking

In a lofty-sounding process known as state management, administrators of web sites and search engines can optimize the online experience on your desktop or laptop computer’s browser through the use of cookies, which are little text files stored in your browser caches recording your user IDs, passwords, personalized themes, and other preferences. It’s achieved simply enough. But for mobile devices … Read More