Archives - Mobile Security


How to combat robocall scams

Remember the National Do Not Call Registry? This database, authorized by the federal  Implementation Act of 2003, contains a list of phone numbers of individuals and families who have indicated that they do not want telemarketers to contact them. At the time of its creation, it was widely heralded as a big step forward for […]

Secure your mobile data using a Virtual Private Network service

VPN allows you to connect to the internet securely by keeping your exchanges private while you use Wi-Fi. VPNs encrypt connections at the sending and receiving ends and keep out traffic that is not properly encrypted. If a VPN is available to you, make sure you log onto it any time you need to use […]

Take advantage of cardless ATMs

ATMs have long been targets of sophisticated cyberattacks designed to steal PINs or extract data from old-fashioned magnetic stripe cards. Luckily, there’s an increasingly common way to avoid giving away so much info when trying to withdraw or deposit cash – cardless ATMs. Some banks allow you to login in to one using your phone, […]

Avoid mobile redirect pages by using an extension or privacy-focused browser

Mobile ads can be very assertive. In some cases, you’ll be browsing a site only to have the page hijacked to another one saying you’ve won a prize, which you most likely have not. The only reliable way to avoid these risky redirects is via an extension to a browser such as Safari on iOS, […]

Reassess your two-factor authentication before changing your phone number

If you ever want or need to change your phone number, be sure to check on your two-factor authentication (2FA) setups first. Many 2FA services use your phone number, meaning you might no longer get the needed texts or calls to access your accounts after changing. Use alternatives like authenticator apps or trusted devices instead […]

Is your Android AV software putting you at risk?

Android is the world’s most popular consumer operating system, powering billions of phones, tablets and other internet-connected devices. Since its earliest days, though, the OS has had a reputation for being less secure than its primary competitor, Apple iOS. The main reasons behind this perception have included the extensive permissions in the Android API that […]