Archive for the ‘Mobile Security’ Category

Android Hacked

Android-smartphones vulnerable

Major Android Bug is a Privacy Disaster

The vulnerability allows to intercept the current session cookies and gain complete control over the user’s session.

In the Metasploit (popular among security researchers a set of tools for penetration testing), appeared a new module that allows to exploit a dangerous vulnerability in a 75% of all smartphones based on Android operating system. The flaw makes it possible to intercept web-pages which viewed victim. It is reported by The Register.

We are talking about the vulnerability CVE-2014-6041, affecting the Android 4.2.1 (and earlier versions). To discover its managed 1 September, according to researcher Tod Beardsley (a developer for the Metasploit security toolkit), who called the flaw a “privacy disaster”. (more…)

mobile threatsClones and compromised legitimate apps are a concern for mobile users

Cybercriminals continue to attack mobile phones through new and devious tactics, using both malicious clones and legitimate apps as bait.

We’ve stepped into the technologically advanced future that we grew up hearing about for quite some time now and so far it has been great. Unfortunately, the cybercriminal lot is determined to spoil the fun for all of us. After haunting computer machines, primarily Windows computers, for over a decade, they seem to have turned much of their attention to smartphones, the Michael Jackson of technology (oh come on, who doesn’t love the moon-walking King of Pop?). Giving a completely new meaning to communications and entertainment, the cell phones of today leave very little to be desired, except for maybe a force-field to deflect all the malware targeting them. As if the situation wasn’t bad enough already, McAfee Labs has revealed in its quarterly threat assessment that cybercriminals are targeting mobile devices in newer and smarter ways than before. (more…)

Android App Security5 Ways To Secure Your Next Android App

Android security has become a hot button issue among Android users and developers alike. While the Android platform does offer significantly more freedom when compared to iOS, BlackBerry and Microsoft operating systems, this freedom has a trade off; Android devices and applications have often been seen as far less secure than other options. For this reason, Android developers need to take special precautions when securing their applications. (more…)

mobile security tipsIdentity theft has become a serious problem in an increasing number of areas.

(more…)

Secure Mobile Device

Secure Mobile Device

The truth is that getting a more secure device or downloading some security apps is always a good idea, but there are some instances when this is a necessity. Not only does having a more secure device protect you from hackers, but most of these smartphones and tablets are stronger than the other models on the market. This allows you to do more work in less time because the device will be capable of processing more data.

1. Slow Processing

If you have an old device or a weak CPU, then you’ll obviously have a slow device. This isn’t really a problem. This only becomes an issue if your device randomly becomes much slower. It’s even worse if your device is slow for several hours, but then it resumes normal functioning.

(more…)

Lookout Security and Antivirus

Lookout Security logo• This type of app protects an individual’s phone from getting viruses. This is because most individuals get to share videos, songs, and games among others, which are all downloaded from the internet. Ensuring that the phone is installed with this app goes on to curb the virus menace.
• It also ensures that an individual has peace of mind because it also protects the phone from getting lost when stolen. The individual has to only access Google Map so as to locate where their device is. This one locates the phone even when it is off, on vibration and when the battery goes off.
• Since most people have lock codes on their phones, the person stealing it might try to unlock the code. Immediately they try that, the phone sends a message to the individuals email address, which contains the picture of the person trying to unlock together with their location.
• Any data on the phone that the individual would want it to remain private is also protected and no one can access it without the owner of the phone knowing. (more…)