Archives - Mobile Security


Never “jailbreak” or “root” your smartphone

You may have heard of jailbreaking. It’s the practice of removing a device’s restricted mode of operation, thus giving the user access to all of the operating system’s features. While this enables greater third-party access, it also strips away all of the safety and security measures put in place by the manufacturer. Jailbreaking turns your […]

Enable remote device wiping or recovery to protect sensitive data

Let’s say you lose your company-given cellphone somewhere, but on that phone there’s delicate corporate information. Enabling remote wipe on your phone allows the IT department to erase the data. Here’s how to do it on an iPhone: The “Find My iPhone” feature must first be enabled On a separate device, sign into iCloud.com and […]

If you notice these strange symptoms, your phone may have been hacked

Although more malware attacks happen to Android users, both Android and iPhone users can be hacked. Common signs include: A noticeably sluggish performance with frequent freezing Strange pop-up alerts Outgoing calls and texts you haven’t sent Poor battery life Use a product like Total Defense Mobile Security software to increase your protection from mobile malware […]

Avoid third-party mobile app stores

Mobile phone and tablet software should be evaluated by approval teams to ensure their quality and security. These procedures are routine on official app stores but cannot be assured with third-party sources. Consequently, stay clear of unofficial storefronts or sideloaded apps from websites.

Avoid downloading apps for features your device is already capable of

Some users may download something like a QR code scanner or camera app without realizing their smartphone has these apps and features pre-installed. While some of these other apps may be safe, a lot of them can be a front for malicious software. Installing them may lead to your data being stolen or a loss […]

Carefully consider granting application permissions

Mobile apps often ask for numerous permissions, including access to your camera, contacts list and geolocation. Think hard before permitting them, since some applications only want these abilities for data harvesting purposes. For example, it’s not usually vital to give Facebook access to your location, or to let Instagram listen in on your microphone.