Security Mistakes and Exploitation of Mobile Apps

Security Mistakes and Exploitation of Mobile Apps

Security mistakes in mobile app development are quite common and can lead to the user’s mobile device being compromised and his or her data being manipulated by the hacker. As the race for supremacy in the smartphones business increases, vendors’ focus on creating more sophisticated apps for their customers leads them to use the services …

Read moreSecurity Mistakes and Exploitation of Mobile Apps

Details about DROWN attacks and how to prevent them

DROWN attacks protection

A whopping 11.5M websites using the HTTPS protocol for encryption are estimated to be at the risk of being attacked and having their data compromised and stolen from a new vulnerability that has been detected as a loophole in OpenSSL, identified as DROWN. Decrypting RSA with Obsolete and Weakened encryption (DROWN) uses an outdated security …

Read moreDetails about DROWN attacks and how to prevent them

Android, Apple, BlackBerry: Which phone is more vulnerable to online threats?

which phone is more vulnerable to hackers online

The FBI and Apple are currently awaiting court regarding a government request for a backdoor to the iPhone, which has been used by Syed RizwanFarook, San Bernardino terrorist. This is the tip of the iceberg, with the wider picture including the debate as to which of the phones nowadays can live up to the challenge …

Read moreAndroid, Apple, BlackBerry: Which phone is more vulnerable to online threats?

2016 Apple security advances you must take note of

Apple security advances

If you are conscious about online security, it is prudent to say that you will be thrilled by the progress made on behalf of Apple in this field. In fact, there are quite a few security details that can make substantial difference in the overall online protection matter for all users. So, whether or not …

Read more2016 Apple security advances you must take note of

2016 Internet of Things Predictions in a Nutshell For You

Predictions for Internet of Things as 2016 Arrives

The Internet of Things (aka IOT) has dominated the field of technology for many years now, and this means that it is high time to deal with this seriously. Considering the security concerns in regards to Internet of Things, there are forthcoming changes that will emerge in 2016. The drive for these changes is nothing …

Read more2016 Internet of Things Predictions in a Nutshell For You

Creating Strong Passwords: Which Password Strategy is the Best?

We always use passwords, since they pretty much define our online existence. This means that wherever we wish to enter, we have to think of the proper password credentials. Social media accounts, emails, bank accounts and many other sites request a strong password of yours. However, the actual nature of the password has been under …

Read moreCreating Strong Passwords: Which Password Strategy is the Best?

Don’t allow yourself to be spied on, take charge of your privacy

There are millions of surveillance equipment pieces in the world today. In the UK alone, there are over 6.1million surveillance cameras. Now, there is chance that you are being spied on. In fact, it is highly likely that as you read this someone or a program is monitoring you. The world as it is today …

Read moreDon’t allow yourself to be spied on, take charge of your privacy

Spying on text messages remotely without having phone possible? Yes!

Text Spying

Text message monitoring is something that many people might desire for both good and bad reasons. Take an example of a parent who wants to make sure that his or her children can have a smart phone but is worried that they might expose themselves to danger by communicating with risky people online. That parent …

Read moreSpying on text messages remotely without having phone possible? Yes!

Encryption; should governments have a way in?

Encryption governments have way

Every time there is a major terrorist attack the governments involved are asked to look for clues that they missed and therefore the successful attack. The recent attack in Paris is no different, with intelligence officers from across the world examining how intelligence in France missed the communication between the obviously coordinated attacks. The same …

Read moreEncryption; should governments have a way in?