iOS app Android app

Mobile Security

Mobile Security vs. Blackphone Marketing and Sales Hype

Rebecca Abrahams | Posted 08.13.2014 | Technology
Rebecca Abrahams

co-authored by Tom Malatesta, CEO, Ziklag Systems For those focused on the subject matter, yesterday's Tweet fest from TeamAndIRC and Blackphone was ...

Can Facebook's Microphone Feature Get Hijacked? Probably YES!

Rebecca Abrahams | Posted 07.30.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Chairman & CTO Ziklag Systems Facebook has announced a new feature for its mobile APP that will turn on your smar...

What iBeacon May Mean for Your Security

Rebecca Abrahams | Posted 05.14.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen, Chairman, ZiklagSystems A story appeared in Forbes on March 12th about an Apple product called iBeacon. Written by ...

When Cyber Security Really Means Personal Security

Alan W. Silberberg | Posted 03.02.2014 | Business
Alan W. Silberberg

2013 brought that word into most American's daily conversations as a result of the devastating revelations by Edward Snowden.

GEN Y Does Not Want to Hear About BYOD Security Measures

Rebecca Abrahams | Posted 01.23.2014 | Technology
Rebecca Abrahams

co-authored by Dr. Stephen Bryen Increasingly in the United States and around the world individuals use smartphones, and smart tablets, for personal ...

Conspiracy Theory, WIFI and Android Backup

Rebecca Abrahams | Posted 11.24.2013 | Technology
Rebecca Abrahams

These days it is getting more and more difficult not to be a conspiracy theorist. If you are concerned about security, especially mobile phone security, the amount of angst has risen by now to unprecedented levels.

Keeping Tabs on Your Kids

Robert Siciliano | Posted 11.20.2013 | Technology
Robert Siciliano

Look, I hear this all the time: "I want to respect my children's privacy, but I also want to keep tabs on them." OK, I get it. Kids need their privacy...

Apple's Gamble on Fingerprint Scanners May Take a While to Pay Off

Tarun Wadhwa | Posted 11.12.2013 | Technology
Tarun Wadhwa

If Touch ID doesn't work how users believe it should, they will simply ignore it and forget about it. But for Apple, that will mean an enormous business opportunity lost.

Warning: This App May Ruin Your Life

Rohit Sethi | Posted 09.16.2013 | Technology
Rohit Sethi

Mobile hacking is a growing threat that consumers need to take seriously. This is especially true for work phones and for anyone who uses mobile banking or saves financial or sensitive information on their smartphone.

Malware on the Go

Hemanshu Nigam | Posted 07.15.2013 | Technology
Hemanshu Nigam

By analyzing over 1.85 million mobile apps and vulnerabilities, the study found that 92 percent of identified threats involved Android smartphones (one of the most popular cellphones available).

Airborne WIFI Not So Safe

Rebecca Abrahams | Posted 08.04.2013 | Technology
Rebecca Abrahams

Keep in mind that stealing information is a big business, and hackers are everywhere. Most of them are professional. Some are foreign government sponsored. Some are sophisticated criminal organizations with significant resources

The Spy and the Mobile Phone

Rebecca Abrahams | Posted 07.20.2013 | Technology
Rebecca Abrahams

A simple phone is harder to track than a smartphone. Such a phone would lack the WIFI, Bluetooth and GPS features of a smart phone, it would contain very little information.

What Your Smartphone Won't Tell You

Rebecca Abrahams | Posted 06.29.2013 | Technology
Rebecca Abrahams

It's fairly safe to assume that calendars, call logs, contacts, emails, financial data, text messages, photos and videos stored on smartphones or mobile devices are at risk of being monitored or stolen.

It's Trick or Treat in Cyberland...

Rebecca Abrahams | Posted 06.01.2013 | Technology
Rebecca Abrahams

Mobile connectivity is exploding and smartphones and tablets are whetting the appetites of cyber criminals and the population of hacker world. Any device that has information stored on it is vulnerable.

Top Online Security Threats of 2013 -- and How You Can Protect Yourself

Jeff Hindenach | Posted 02.26.2013 | Technology
Jeff Hindenach

2013 will be the year of the mobile security threat. With online technology rapidly moving from computers to the palms of our hands, cybercriminals and hackers are evolving their methods to fit the times.

Do We Really Need Mobile Security?

Drew Hendricks | Posted 02.16.2013 | Technology
Drew Hendricks

This holiday season, mobile phones and tablets will be one of the top gifts on Christmas lists, and they'll become another digital repository for personal and private information. If you're giving or receiving these devices, take the extra steps to secure your gift with a mobile security option.

Online Banking vs. Mobile Banking

Robert Siciliano | Posted 08.01.2012 | Money
Robert Siciliano

While PC-based online banking is not much older than a high school student, mobile banking is still in elementary school. However, online banking's younger sibling is quickly catching up to the slightly more established option.

Survey Says: Is Mobile Security Costing You Customers?

The Huffington Post | Rieva Lesonsky | Posted 12.07.2011 | Small Business

When it comes to mobile security and privacy, it seems consumers want to have it both ways. A recent survey by AdaptiveMobile found that 69 percent of...

WATCH: It's Shockingly Easy To Break Into The New Galaxy Nexus Phone

The Huffington Post | Timothy Stenovec | Posted 01.11.2012 | Technology

The Face Unlock feature in Android 4.0 for the Galaxy Nexus is pretty darn cool -- it unlocks the phone using facial recognition software so you don't...

Mobile Hacking Sets Off Security Gold Rush

Posted 07.18.2011 | Technology

By Leila Abboud and Marie Mawad PARIS (Reuters) - Hackers are increasingly aiming attacks at smartphones, touching off a race among software g...

The Wavelength: Attack of the Media Mega-Mergers! Skyprosoft, AT&T-Mobile and more

The Media Consortium | Posted 07.17.2011 | Media
The Media Consortium

Another day, another media mega-merger. The latest? Microsoft is buying Skype, the Internet communications company, for $8.5 billion.

Android More Vulnerable To Attacks Than iPhone

The Huffington Post | Catharine Smith | Posted 05.25.2011 | Technology

According to Trend Micro Inc., the world's largest corporate security software provider, devices running Google's Android mobile operating software ar...

Hackers Go Mobile: Is Your Cell Phone Prepared?

Chris Brassington | Posted 05.25.2011 | Business
Chris Brassington

Make sure you are aware of the sheer extent of personal data you are storing and exchanging on your mobile, and take steps to prevent that from getting into the wrong hands