Archives - Mobile Apps


Limit location permissions

Some apps have access to the mobile device’s location services and thus have access to the user’s approximate physical location. For apps that require access to location data to function, consider limiting this access to when the app is in use only.

What are the risks associated with mobile device apps?

Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar […]

Update access for Dropbox files from the mobile app

Sharing files over Dropbox is easy and convenient. If you need to revoke access to select files from certain users after their duties have changed, navigate to that file from the mobile app. Then, select the vertical ellipsis to its right and click “Manage access.” You can update the permissions from there.

Only install mobile apps from reputable sources

Jailbreaking, installing apps from unknown sources, and other workarounds that allow free access to paid apps and games can be tempting, but can create large security gaps that allow malware to infect your phone, leaving your personal information at risk.

Keep your Netflix and Spotify updated

Cybercriminals tend to target out-of-date programs since they have less advanced security built into them. Netflix and Spotify are two of the hottest targets for hackers, who steal login information and sell it on the black market to those who don’t want to pay the full amount for an account. The longer you wait to […]

Pay attention to permission requests from recently installed mobile apps

Cybercriminals can use mobile apps to infect your device with malware and gain access to your private data. When you download a new application, never give it access to other apps unless it’s absolutely necessary. If you download a new iPhone game, for example, don’t accept its request for access to your photos or location.