Mobile malware
Mobile malware is far from as popular as malicious software that targets desktop machines but with these variants infecting Android, iOS, and sometim…
Learn about Data Science and Cyber Security.
Mobile malware is far from as popular as malicious software that targets desktop machines but with these variants infecting Android, iOS, and sometim…
No matter which mobile operating system you have adopted, downloading apps from verified, trusted sources such as Google Play and Apple's App st…
Telegram is another popular chat application. Available for Android, iOS, Windows Phone, macOS, Linux, Windows, and desktop, Telegram has a "S…
Facebook Messenger is not encrypted by default, and the social media giant says rolling out encryption could take years. The chat service does, howev…
Apple's iMessage, a communications platform that comes with Mac and iOS products, is another option if you want to secure and protect your digi…
WhatsApp is a messaging app that completed a rollout of end-to-end encryption across all compatible devices in 2016. Available for Android, iOS, Win…
Signal is widely regarded as the most accessible, secure messaging service in existence today. Available for Android, iOS, macOS, and Windows, the fr…
SEE ALS 10 dangerous app vulnerabilities to watch out for (free PDF) There was once a time when Pretty Good Privacy (PGP) was one of only a handful…
Rooting your device to allow the installation of software that has not been verified by vendors or made available in official app stores has securi…
We want to stop ourselves from being monitored without consent, but some technologies can be beneficial for tracking down our own lost or stolen prop…
Face recognition, iris scanning, and fingerprints are biometric authentication options found on modern iPhones and Android devices. These services c…
It sounds simple, but many of us don't do it -- make sure your mobile device is locked in some way to prevent physical compromise. You can turn …
Mobile devices can act as a secondary means of protection for your online accounts via 2FA, but these endpoints can also be the weak link that compl…
SIM hijacking: 2FA is a strong security standard, but if you are unlucky enough to become a victim of SIM hijacking, this layer of security means ve…
Two-factor authentication (2FA), also known as two-step verification, is a widely-implemented method of adding an extra layer of security to your a…