It lies next to you as you sleep, comes with you to work, rides home with you in your car and even travels with you on vacation. Your smartphone goes with you everywhere. Although convenient, the unprecedented connectivity we are experiencing culturally with mobile devices can create an equally daunting issue when it comes to Read more…
Some days it feels like the whole world is going mobile. We tweet, we text, we browse the world from small devices that fit into our hands. People from across the globe can reach out to each other with one message. You can buy a plane ticket while on the bus. There are apps that Read more…
Mobile devices nowadays are larger than life: We take them to work, the grocery store, the doctor’s office, and pretty much anywhere else we want to stay connected. We use them from the moment we wake up to the moment we go to bed. We browse the web, snap photos, check our email, even deposit Read more…
McAfee has always been in forefront of finding new ways for securing our customers against threats and risks posed with mobile device. As part of this quest, we have introduced the concept of app reputation as part of our latest release of McAfee Mobile Security (MMS)(Ver 3.1) released on 18th July 2013. From a consumer perspective, Read more…
Nothing in life is free, and that’s especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace—most are legitimate and available at no initial cost. But they often come at the price of offering up data from your smartphone or tablet that you might not be aware of or Read more…
Whether it’s customers visiting an eCommerce site via their smartphone, or cashiers using a mobile device to accept payments, chances are mCommerce has played a big role in how retail transactions are carried out today. However, despite the ubiquity, mobile devices also present a whole new array of security risks for both businesses and shoppers Read more…
It’s that time again: long sunny days, vacations in warm locales—the last thing you want to worry about as you’re planning your next summer getaway is being duped by travel-related scams on phony websites or having your identity stolen if your mobile device goes missing while on vacation. Previously, we’ve discussed best practices to keep Read more…
Recently, a vulnerability in Android package signature verification was announced by Jeff Forristal, CTO of Bluebox Security. Jeff plans on revealing details at the upcoming BlackHat Briefings at the end of this month. Though he has not released any details on his findings beyond the initial blog post more information is becoming available on how Read more…
Imagine you’re surfing the web in search of a new pair of shoes on Zappos.com. You browse the website, look over a number of tennis shoes in your size. If you already have an account, you log in and save a couple of your favorites to a wish list. Eventually, you leave the site to Read more…
With more than 50 million users, and reportedly growing by 20,000 everyday, Kik has become one of the most popular messaging apps on the market. It is widely used as a messaging portal between those who want to connect privately off of other social media (Facebook, Twitter, and Instagram). But more importantly, it has become Read more…