Category Archives: Mobile Threats

What Master Key? – Android Signature Bypass Vulnerability

Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on revealing details at the upcoming BlackHat Briefings at the end of this month. Though he has not released any details on his findings beyond the initial blog post more information is becoming available on how Read more…

Does Kik Messenger Pose a Danger to Your Kids?

With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular messaging apps on the market. It is widely used as a messaging portal between those who want to connect privately off of other social media (Facebook, Twitter, and Instagram). But more importantly, it has become Read more…

How the Proliferation of Mobile Devices is Impacting Consumer Security

Mobile technology is the new frontier for fraudsters. Most of us don’t protect our smartphones or tablets—and the private information they contain—anywhere near as well as we do our wallets and PCs (even though most us would rather lose our wallets vs. our smartphones). Even the simple safeguard of a four-digit password is too much Read more…

McAfee Hidden Device Admin Detector – Free Protection from Android Malware

A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system (OS). What differentiates a Trojan from a traditional virus is that this type of software attempts to masquerade as something useful in order to trick users into opening the file and then leaves a backdoor open so Read more…

McAfee Hidden Device Admin Detector – Free Protection from Android Malware

A few weeks ago, we told you about Obad, a backdoor Trojan that targets the Android operating system. This Trojan affects all Android OS users, and it is strongly recommended that you address this flaw immediately! What does Obad do? Essentially, Obad enables the downloading of malicious apps onto your Android device right under your Read more…

Download with Caution! McAfee Identifies Risky Mobile App Sources

As more people use mobile devices in their daily lives, those devices are rendering them increasingly vulnerable to infection through the very apps we rely on to make our lives easier. According to McAfee’s recent report, “Mobile Security: McAfee Consumer Trends Report – June 2013”, malware threats have not only increased for mobile devices, but Read more…

Why it’s Critical to Protect Data on Digital Devices

When devices are lost or hacked and your data is exposed, not only is this a pain to deal with, but you could become a victim of identity theft. Not only do victims of identity theft suffer loss of time  but they also lose money that may not be able to be recovered . In Read more…

The Defense Department Lists Mobile Security as a Top Priority

Does your organization prioritize mobile security? According to recent news, even the U.S. Department of Defense (DOD) is concerned about mobile security and the ability to securely transfer information between mobile devices. This is no small task for the DOD: according to the American Forces Press Service, the DOD has over 600,000 commercial mobile devices Read more…

5 More Mobile Security Tips

      No Comments on 5 More Mobile Security Tips

A cybercriminal’s full time job is creating new crimes, and he or she will make full use of technology to hide their activities to fool you. And with mobile devices, this is no different. The threat to our mobile devices is also high because our smartphones are always connected, they usually carry some personal data, Read more…

Smart Perimeter – A Security Fence For Your Digital Devices

Everyone has experienced that gut-wrenching feeling when you look around and realize that one of your prized possessions is missing.  Whether it’s your wallet, keys, or smartphone, that feeling of panic and loss is devastating.   In today’s digitally connected world that feeling has become incredibly too common. In a recent Digital Assets survey, McAfee discovered Read more…