Archives - Mobile Security


Audit app permissions

For apps that you haven’t used in a long time — or some of the ones that came preinstalled on your device — you may not have ever looked at what permissions have been allowed. It’s worth taking some to check through these to make sure you’re not giving away too much of your personal […]

Be sure to lock all your mobile devices

You lock the front door to your house, and you should do the same with your tablets and smartphones. Employ strong passwords to lock down your tablet and phone. Securing your devices keeps prying eyes out and can help protect your information in case your devices are ever lost or stolen.

A quick guide to app tracking

How often after downloading an app have you been asked to share your data? How many times have you said yes – even if you didn’t really know what it meant? In either case, you’re not alone.  When you use an app, search the web or send a message, you leave behind a trail of […]

Revisit your smartphone privacy settings every once in a while

When you set up a new phone or download an app, it’s easy to get in the habit of approving every prompt that flashes across the screen. These prompts are often asking you for permission to access personal information, such as your location. It’s a good idea to go back into your settings and purge […]

Customize applications you have access to when your iPhone is locked

The release of iOS 15.4 introduced a suite of new features for iPhone users. One new ability – the ability to customize which apps you can access from the lock screen – could pose a risk to your cybersecurity. When trying this new addition, be careful which apps you enable. Messages and the Wallet app, […]

Turn off location tracking for wearable devices

Wearable technologies – like watches or wristbands – can be great assets for fitness, productivity and health monitoring. But they also pose a considerable risk to both data privacy and personal safety. Many wearables track the location of the user, among other types of data. This information could be very dangerous if exposed to malicious […]