How Google Analyzes the Security and Privacy Behavior of Android Apps

How Google Analyzes the Security and Privacy Behavior of Android Apps

Google has developed a new classification algorithm for mobile apps in the Play store that enables the company to group apps together based on their relative security characteristics and help users better understand what they’re installing.

Google Pushes Out Flaw Fixing Android Security Patch

Google Pushes Out Flaw Fixing Android Security Patch

Google has pushed out an update for Android to fix a slew of cyber security holes, inducing a number of remote code execution vulnerabilities. 

The July security patch notably plugs vulnerabilities that surface when files like images and videos are processed by the mobile operating system for display. and enable the execution of arbitrary code. 

Apple iOS 10.3.2 Is Causing New Problems

Apple iOS 10.3.2 Is Causing New Problems

What Apple has done is what it normally does after an iOS release: it stopped signing the previous version. This means users running iOS 10.3.2 can no longer downgrade (eg to iOS 10.3.1) because the ‘sign off’ an upgrade looks for on Apple’s servers before installing will no longer be given.

How to Achieve an Optimal Security Posture

How to Achieve an Optimal Security Posture

The perfect IT security solution is one that makes an enterprise completely secure and "unhackable," where no unauthorized parties can get onto the network, access confidential data, deny service to legitimate users, or otherwise carry out any malicious or unwanted activities.

Europe more ‘sceptical’ around BYOD with GDPR threat looming, warns Strategy Analytics

Europe more ‘sceptical’ around BYOD with GDPR threat looming, warns Strategy Analytics

The UK, alongside France and Germany, remain ‘sceptical’ around bring your own device (BYOD) and its impact with General Data Protection Regulation (GDPR), according to a note from Strategy Analytics.

7 Things You Must Keep In Mind While Using Mobile Banking Apps

7 Things You Must Keep In Mind While Using Mobile Banking Apps

In today’s fast-paced life more and more users are making transactions online, transferring money and even keeping a track of their bank accounts on their mobile devices via Banking Apps. However with convenience comes caution that we should follow at all times to keep our money safe. Listed below are 7 such precautions that you need to take while using Banking apps on your mobile devices:

8 reasons why you should strengthen your iOS passcode today

8 reasons why you should strengthen your iOS passcode today

Every enterprise IT manager knows the ghastly truth: the biggest security weaknesses in any system are the humans using it. So, if you are one of the nearly one-in-ten iOS users (or even the one-in-three Android users) who don’t use a passcode, if you happen to be one of the many who use the same passcode for everything, or even one of the 15 percent of users who still insist on using any of these ten passcodes, then this article is for you. It’s time to toughen up. Here’s why:

Streamlining Campus Mobile Security in the Age of IoT

Streamlining Campus Mobile Security in the Age of IoT

The Internet of things (IoT) is changing how organizations manage their buildings and assets, while also spurring a transformation in the modern facility. As offices, healthcare institutions and university campuses ad mobile campus security, the people using these facilities are becoming more mobile and connected.

How Weak Mobile Health App Privacy, Security Affects Patients

How Weak Mobile Health App Privacy, Security Affects Patients

Mobile users are increasingly utilizing their devices for healthcare needs, whether it is through fitness trackers or even for communicating with providers. However, inadequate mobile health app privacy or policies that are difficult to understand could lead to patient data privacy concerns.

EU Schools US and UK on Digital Privacy Laws

EU Schools US and UK on Digital Privacy Laws

The European Union thinks digital privacy is so important it should be protected by law, and that’s exactly what its trying to do with new proposed legislation. Unlike the United States and United Kingdom, which are pushing for laws that would strip away digital privacy and encryption security, the EU looking to mandate those protections.

Watch out! App Store scammers are earning MILLIONS through fraudulent software

Watch out! App Store scammers are earning MILLIONS through fraudulent software

The Apple App Store is still considered one of the safest places from which to download your mobile apps. Apps are curated, reviewed and any security concerns are almost always immediately addressed by Apple.

However, there's new emerging scheme that can potentially put your hard-earned cash at risk. And more alarmingly, the scammers are apparently using App Store loopholes to execute their unscrupulous deeds.

Gartner EMM Report Highlights Mobile Security Advancements

Gartner EMM Report Highlights Mobile Security Advancements

With evolving healthcare mobile devices, organizations must consider an enterprise mobility management (EMM) solution that can adapt to the rate of device advancement and address mobile security concerns.

U.S. Leads BYOD Implementation, but EU Holds Back

U.S. Leads BYOD Implementation, but EU Holds Back

Over the years, BYOD has moved beyond being just an employee mobility model; from giving employees the flexibility to work from anywhere, with their own choice of device, to a cost-cutting tool: replacing company-owned devices with employees own personal devices. BYOD implementation has also been much more economical than traditional enterprise purchasing, while providing the network infrastructure and support required by users.

Apple softens its stance on developers using iOS as a platform for coding

Apple softens its stance on developers using iOS as a platform for coding

This is huge. It plays into Apple’s educational ambitions by making iOS a more viable platform to learn software development, as students will be able to import and run sample projects.

10 things to implement best cloud based security

10 things to implement best cloud based security

Cloud based security is a combination of several factors, namely – physical safety of data, reliable backup, constant monitoring solutions, and state-of-art security software. Choosing the right AWS consulting partner is crucial to the operation of an enterprise, as it means handing over the organizational data to the care of another organization (the AWS consulting partner) that may or may not live up to the standards of the best-in-class cloud security.