Mobile and Internet of Things
Now, even our vehicles – essential parts of our day-to-day lives – are connected to the internet, and while cars’ collection, storage and use of data can help make life more convenient and efficient, they also present security and privacy risks. It’s important to know what information our cars collect, how they use our data and how we can manage our privacy and identities in a growing connected car landscape.
Before you add a device to your home network, take into account these tips so that you can rest easy knowing your smart home is more secure.
Pokémon Go, a virtual reality mobile app, is catching on with “moveset” speed. Smartphone users are meeting up at PokéStops and “gyms” to battle it out and staying up until the wee hours to capture the rare ones. As with all mobile apps, there are risks to consider when using Pokémon Go. Here are some tips on how to minimize them.
Like apps that let you pay at stores with your phone, "peer-to-peer" payment services can be a convenient way to pay friends. But before you use one, check the app's settings for available security features.
Our smartphones and tablets, along with many other everyday objects, are as powerful and connected as our PCs and laptops. We must take steps to protect the information on all of our smart devices, just like we would for our computers.
While mobile's role in e-commerce presents plenty of opportunities for businesses to deliver relevant, cost-efficient mobile marketing offers to consumers' mobile devices, it also requires that businesses take some precautions. Here are five tips for safer mobile payments.
Armor for Android security researcher James Green breaks down the mobile threat landscape to Android OS and importance of updates to protect your device from infection.
McAfee blogger Taylor Tompkins looks at how to adjust the settings for downloading apps on some of today's most popular smartphones.
A look at one surprising theme from the U.S. Federal Trade Commission's June 5, 2013, workshop, "Mobile Security: Potential Threats and Solutions" -- the relative success of mitigating the impact of mobile malware on U.S. users, and how cybercriminals are adjusting to develop more successful methods of accessing mobile devices in the future.
John Skorick, Founder and CEO of personal privacy company MyAKA.com, LLC, discusses how your mobile phone number can be an access point to invading your privacy, and methods to securing both.
As increasing amounts of personal data are held on small, mobile devices, the risk of having that data stolen is also increasing.
Teachers and parents need to commit to protecting their kids’ smartphones and teaching them how to use them safely. These 5 tips will help parents, teachers and kids work together to use the classroom as a place to learn how to take advantage of mobile opportunities while preventing the risks.
Looking past how cell-phone crazy this generation of kids has become, one question still remains – when can your child handle a mobile phone and the responsibilities that come with owning a phone?
We store our email and social accounts, access to mobile banking, photos, contacts and more, on our smartphones – so protecting it is more important than ever!