How to cost-effectively manage and secure a mobile ecosystem

Credit to Author: Todd VanderArk| Date: Tue, 16 Jul 2019 16:00:44 +0000

In a world of booming mobility, Pradeo Security Mobile Threat Defense and Microsoft are partnering together for a brighter and more secure future.

The post How to cost-effectively manage and secure a mobile ecosystem appeared first on Microsoft Security.

Read more

All the reasons why cybercriminals want to hack your phone

Credit to Author: Kayla Matthews| Date: Tue, 18 Dec 2018 16:00:00 +0000

Why would a criminal want to hack your phone? Perhaps the better question may be: Why wouldn’t they? We take a look at all the reasons hackers have for breaking into your most precious device—and what you can do to stop it.

Categories:

Tags:

(Read more…)

The post All the reasons why cybercriminals want to hack your phone appeared first on Malwarebytes Labs.

Read more

Android security audit: An easy-to-follow annual checklist

Credit to Author: JR Raphael| Date: Wed, 12 Dec 2018 13:35:00 -0800

Android security is always a hot topic on these here Nets of Inter — and almost always for the wrong reason.

As we’ve discussed ad nauseam over the years, most of the missives you read about this-or-that super-scary malware/virus/brain-eating-boogie-monster are overly sensationalized accounts tied to theoretical threats with practically zero chance of actually affecting you in the real world. If you look closely, in fact, you’ll start to notice that the vast majority of those stories stem from companies that — gasp! — make their money selling malware protection programs for Android phones. (Pure coincidence, right?)

To read this article in full, please click here

Read more

10 Android settings that'll strengthen your security

Credit to Author: JR Raphael| Date: Tue, 20 Nov 2018 08:30:00 -0800

You might not know it from all the panic-inducing headlines out there, but Android is actually packed with powerful and practical security features. Some are activated by default and protecting you whether you realize it or not, while others are more out of the way but equally deserving of your attention.

So stop wasting your time worrying about the Android malware monster du jour and which security company is using it to scare you into an unnecessary subscription, and take a moment instead to look through these far more impactful Android security settings — starting with the core elements and moving from there into some more advanced and easily overlooked options.

To read this article in full, please click here

Read more

This festive season secure your mobile payments

Credit to Author: Sushmita Kalashikar| Date: Wed, 17 Oct 2018 13:40:00 +0000

Festivities in India have begun and it’s time for a joyride of celebrations, merriment, lots of tantalising food and exchange of gifts. Talking of food and gifts, the festive season is also a time for ecommerce sites to spring into action, by offering tempting discounts and sales to lure people…

Read more

The Need For Anti-Virus As Mobile Wallet Transactions Hit Record 14,170 Crore

Credit to Author: Sushmita Kalashikar| Date: Wed, 26 Sep 2018 05:24:43 +0000

After mobile wallet transactions experienced a setback owing to the mandatory know-your-customer (KYC) requirements in March, mobile wallet companies have bounced back with a record transaction of 14,170 crore in May, the highest recorded transaction after January. Thus, M-Wallets are back in vogue with companies once again succeeding in convincing…

Read more

Android security: Analysis, advice, and next-level knowledge

Credit to Author: JR Raphael| Date: Thu, 26 Jul 2018 03:00:00 -0700

It’s tough to talk about Android security without venturing into sensational terrain.

A large part of that is due to the simple fact that the forces driving most Android security coverage are companies that make their money by selling Android security software — and thus companies with strong interests in pushing the narrative that every Android phone is on the perpetual brink of grave, unfathomable danger. Plus, let’s face it: A headline about 70 gazillion Android phones being vulnerable to the MegaMonsterSkullCrusher Virus is far more enticing than one explaining the nuanced realities of Android security.

In actuality, though, Android security is a complex beast — one with multiple layers in place to protect you and one that almost never warrants an alarmist attitude. I’ve been covering Android security closely since the platform’s earliest days, and I’ve busted more myths and called out more shameless publicity stunts than I can even count at this point.

To read this article in full, please click here

Read more

How mobile threats impact today’s BYOD landscape

Credit to Author: Trend Micro| Date: Mon, 23 Jul 2018 18:56:36 +0000

Bring-your-own-device (BYOD) has been a revolutionary concept for years now, even before it was recognized by enterprise policy. However, now that business executives and IT leaders have realized the benefits this type of strategy for their organizations, BYOD is becoming an increasingly powerful way to support efficient access and productivity. At the same time, however,…

The post How mobile threats impact today’s BYOD landscape appeared first on .

Read more

BlackBerry's Android upgrade track record should give anyone pause

Credit to Author: JR Raphael| Date: Thu, 28 Jun 2018 08:56:00 -0700

Hey, look: A new BlackBerry phone is here! And no, you didn’t just wake up from a 12-year coma. I promise you, it is still 2018.

The new BlackBerry Key2, however, is aimed squarely at those who miss the glory days of the physical-keyboard-packin’ phone — specifically, business users who still place some sort of value on the BlackBerry name (even if it’s technically a different organization making the devices now). The company’s own landing page for the device placards that focus plainly:

To read this article in full, please click here

Read more

Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked?

Credit to Author: Trend Micro| Date: Thu, 14 Jun 2018 13:04:32 +0000

Safe behaviors to protect yourself from cryptojacking follow the familiar rules you should adhere to every day to protect yourself against viruses, worms, bots, and malware, including ransomware, which are typically pushed to you through phishing techniques and social engineering:     Strengthen your network device’s credentials (e.g., your router), to make it less open…

The post Don’t be a Coinmining Zombie – Part 2: How Do You Protect Yourself from being Cryptojacked? appeared first on .

Read more