The Latest in IT Security

Posts Tagged ‘Smartphones’

Connected devices give us access to an unlimited source of information — the Internet. They also serve as a reserve data storage for unmindful owners. Basically, the majority of smartphone users can be called “unmindful” — at least, as compared to their ancestors, who had no mobile phones at all. With information easily accessible by […]

Read more ...

 In a recent blog entry we covered how scammers continue to publish malicious apps on Google Play and how the Android app market is struggling to keep itself clean.In many cases it is difficult to quickly identify any malicious intent of applications and in-depth analysis is often required to be truly safe-a challenge for Google […]

Read more ...

Recently we released a blog talking about the difficulties of keeping app stores free of malicious applications. Today our automated system flagged yet another example of a misleading application that was posted on the Google Play store.The application, named Next Launcher 3D Pro, purports to be a free version of the legitimate app Next Launcher […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments