10 TIPS FOR SECURING YOUR SMARTPHONE
This month is National Cyber Security Awareness Month. Each week within October will take on adifferent theme, with this week's being 'Mobile'. So, with that in mind, we thought we'd prepare some tips to help keep your smartphone safe.
Top 5 threat protection best practices
Trend Micro predicts that there may be as many as a million Android malware threats by the end of the 2014. What's going on here? Make no mistake about it, there are REAL ANDROID MALWARE PROBLEMS. (Credit: Juniper Networks) Part of it is that Android is being targeted because it's extremely popular. The research company Canalys found that Android is running on 59.5 percent of all smart mobile devices that were shipped in the first quarter of 2013.
YES, YOUR SMARTPHONE CAMERA CAN BE USED TO SPY ON YOU...
Yes, smartphone cameras can be used to spy on you - if you're not careful. A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the screen is turned off - a pretty handy tool for a spy or a creepy stalker.
Free Security Scans - Find threats your antivirus missed
Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data,even on your mobile device and Mac. You can't ignore your the safety of your devices any longer: you need to recognize and stop these threats before they do MORE harm.
MALWARE ATTACKS ON ANDROID DEVICES SEE 600% INCREASE IN 2013 / 2014
Malware targeting the Android platform is exploding, with a 600 percent increase in just the past 12 months. That statistic is among the findings of a new study--Mobile Security Threat Report--unveiled last week at the Mobile World Congress in Barcelona, Spain.
Monday, November 6, 2017
New router-based solution protects home IoT devices
Wednesday, January 25, 2017
Quimitch: The first Mac malware of 2017
- The malicious code is extremely simple and consists only of two files.
- The code of malware seems truly ancient with calls dating to pre-OS X times and open source libraries, with the latest update being from the last century.
- Malware targets specific institutions – biomedical research centers. This points to the fact that it could be an attempt to steal research data or other kinds of espionage.
- Malware needs access to the webcam and to capture the screen, exfiltrating data from everything it can access.
Friday, June 10, 2016
EnGenius' SOHO wireless router
Parents can also use EnShare to remotely monitor Cloud Router usage or disconnect devices connected to the IoT Cloud Router whenever they're away from home via an Internet connection.
Learn more >>>
The ESR350 is a 2.4 GHz Wireless N300 IoT Cloud Router with a 4-Port Gigabit Ethernet s... [More]
The ESR350 is a 2.4 GHz Wireless N300 IoT Cloud Router with a 4-Port Gigabit Ethernet switch, Gigabit Ethernet WAN port and USB port. With the free EnShareT app, families can use their Apple iPhones, iPads or Android-based tablets or smartphones to transfer video, music and other files to and from a router-attached USB hard drive when they are in the home or when they are away from home.
Features:
- ESR350 2.4GHz Wireless-N 802.11b/g/n router with 4 port GigE switch.
- Broadband Frequency Band: 2.4 GHz
- Data Rate: 300 Mbit/s
- Frequency Range: 2.412-2.472 GHz
- WiFi Deployment Type: Standalone / Controller-Based
- WiFi Standard: 802.11b / 802.11g / 802.11n
- WiFi Security: WEP / WPA / WPA2
- Environment: Indoor
- Temperature Range: 0-40 deg C
- Data Connectors: 1x Gigabit WAN Port, 4x Gigabit LAN Ports, 1x USB 2.0 Port
- Power Supply: DC IN, 12V 1.5A
- Mfg. Warranty: 1 Year
Tuesday, May 17, 2016
Nine Wi-Fi gadgets that reflect IoT momentum