Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Mobile Phone Security

Your Hacked Mobile Phone Number is Like Your Social Security Number

…fer option for many, and you can even forward your existing number to Google Voice. This helps to mask the calls you make, which means no one would have access to your real number. Use a Carrier-Specific Email to Access Your Mobile Phone Account If you are like most people, your email address and phone number help you to access most of your internet-based accounts. Ideally, instead, you should have a minimum of three email addresses: your…

Mobile SIMs Hacks Cause Concern

…s not have tight owner-verification protocols, and gets away with changing the victim’s account and buying expensive phones. The nbc-2.com report says that this crime is on the increase and is affecting all four of the major mobile carriers: AT&T, T-Mobile, Verizon and Sprint. Here’s another thing to consider: The thief may keep the new phone, which still has your number, to gain access to your online accounts via the two-factor…

Want Mobile Privacy? Read

If you don’t want your smartphone to know more about you than you do, here are top choices, as detailed on gizmodo.com: BlackPhone 2 The Blackphone 2 will black out the federal government from spying on you. Has a five inch handset with full HD screen (with Gorilla Glass 3 that prevents shoulder surfing). 3 GB or RAM Its Silent Circle’s PrivateOS 1.1 provides a “Spaces” UI: Data will be encrypted and compartmentalized. The “Spaces” allow you to…

How to Avoid Bad Apps

…k – Research apps, read reviews, and check app ratings before you download. Check your sources – Only download apps from well-known, reputable app stores. Watch the permissions – Check what info each app is accessing on your mobile devices and make sure you are comfortable with that. Protect your phone – Install comprehensive security on your mobile devices to keep them protected from harmful apps. Robert Siciliano is an Online Safety Expert to…

Mobile Apps Failing Security Tests

…not third-party vendors. This will reduce your chance of downloading a malicious app. Don’t have your apps set to auto login. Even though it may be a pain when you want to access Facebook, it’s better to be safe than sorry. Make sure you use different passwords for each of your apps. Sorry, I know that’s a hassle, but that’s what you must do. And make sure your password is long and strong. Here’s to staying safe on our mobile devices. Robert…

Mobile Apps Failing Security Tests

…not third-party vendors. This will reduce your chance of downloading a malicious app. Don’t have your apps set to auto login. Even though it may be a pain when you want to access Facebook, it’s better to be safe than sorry. Make sure you use different passwords for each of your apps. Sorry, I know that’s a hassle, but that’s what you must do. And make sure your password is long and strong. Here’s to staying safe on our mobile devices. Robert…

Don’t Believe These 6 Mobile Security Myths

…on your social accounts. “SMS” adds protection. The short message service does not provide protection or monitoring of any kind. This means that text messaging is not secure and in fact, it’s often subject to spam. Keep your mobile device safe with McAfee® Mobile Security, available on both Android and Apple devices. The Android version includes antivirus and anti-malware software, an app manager, anti-theft features, and web protection. The…

Mobile Carriers spying on Users

How does my mobile phone know I like tools, electronic gadgets and tarantulas? It keeps showing me ads for these products! Christmas is coming and my kids like bugs, big bugs. How does it know? It’s called “supercookies”. And they aren’t yummy. If Verizon is your carrier, that’s why. Verizon uses a “unique identifier token header” for every website the user visits. There are cookies that tag along with the user wherever they go in cyberspace….

Card Company’s boosting Payment Security with Mobile

…e fingerprint password will be sufficient security after long term testing. New technology is never carved in stone, but let’s at least get it out there and see how it works. Let’s see how new technology like biometrics in a mobile (like Apple pay) can combat credit card fraud. In the meantime, card companies and consumers (and banks) must continue to wrestle with the rampant crimes involving credit cards. Recently, MasterCard teamed with…

10 ways to Keep your Mobile Data safe from mCrime

A smart thief will go after smartphones: a portal through which to gain access to your money, accounts, data and social. Few people think they’re not smart enough to prevent a crime involving their precious mobile phone, but it happens to even the highly educated who think they can’t be outwitted. mCrime is big business and knowing how to protect yourself is a big deal. Texts, e-mails, social media and so much more contain enormous amounts of…

Mobile Employees Are a Security Risk

…This will heap on the pressure to implement solid security plans. Managing each device won’t be cheap, either, but a pricey stitch in time will save an obscene expense times nine. Sixty percent of the survey takers said that mobiles have made employees rather lazy with security awareness. There’s definitely a human factor involved with all of this that businesses must address. If employees want to use mobiles to conduct business, they should…

Removing Location data from Mobile Pics

…ol-perl. Next, to create clean copies of your photos, cd to their folder, then run: exiftool -all= *.jpg. It will then generate copies of the photos There exist a number of other programs for removing location data from your mobile phone, but the steps described here are among the easiest. Robert Siciliano is an Identity Theft Expert to Hotspot Shield. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him…

Researchers say your Mobile Carrier’s Network isn’t all that Secure

…neration network, succeeding 3G to offer the fastest speed for wireless activity. The protocol for 4G, however, is flawed, allowing for weakening of the protection for phones and their networks. The hacker would go right for mobile networks to get simpler, wider entry points. Networks for mobile devices, thus, need to be toughened up. If a smartphone is infected, it will be able to target and scan other smartphones within its proximity (since 4G…

United Airlines Passport Scanning Mobile App: is it safe?

…will get an option to confirm their stored passport data or to scan their passport. If a customer chooses the scan, the app will use the smartphone’s camera to capture passport information. United says this is “similar to a mobile banking deposit.” The flier can retrieve the boarding pass after the passport scan is verified. United says that their passport scanning feature is very time-saving and gives fliers more control. Since it’s launch,…

This Earth Day, “Clean” Your Device Before You Recycle It

…ne search using the appropriate keywords, including the model number. Get rid of data that is on external media, like SIM or SD cards. Your best bet is to cut them in half. You can use a mobile security product, like McAfee® Mobile Security, to wipe your mobile clean of all its apps and data. How to “clean” the data on your computer:Before you get rid of your computer, you must make sure that it’s impossible to recover the data on the hard…

7 Safety tips on the Mobile Internet

…ou typing in a password. Mobile devices don’t mask passwords with those big dots like a laptop or desktop will. That snooping thief is hoping to get a glimpse of your password. Consider sitting against a wall when using your mobile in public. Cover your device with your other hand when entering PINs Click with discretion. The mobile webscape is replete with juicy-looking items to click: promotions, ads, weblinks…and it’s pretty much impossible…

Using your Mobile to protect you from criminals

…name, but would also need to physically have your phone. This is a great layer of security. SMS two factor authentication can be used with site like Facebook, Twitter, your bank, Gmail, Paypal and others. Web sites link your mobile number with your account for your protection. So next time an online company wants to send you a “code” via your smartphone, don’t get annoyed; feel secure instead, because that’s how the company knows you are you. In…

Mobile Phone Hacking: proactive and reactive Responses

…se downloads this changed-name application, and the malicious payload infects their device. A repackaging variation, “updating,” involves adding a code that will tag a malicious payload at a later date. How can you tell your mobile has been infected? It begins behaving oddly. Something is off—sometimes slightly, sometimes blatantly, such as the device is sending your address book to a foreign IP address. Hook your mobile to a WiFi and see where…

Isis Mobile Wallet goes live

…e. Free Smoothies One million smoothies will be given away for free, courtesy of a business partnership between Isis and Jamba Juice. All you need do to get the smoothie is make a purchase with your smartphone using the Isis Mobile Wallet. Why give away a million free smoothies? It’s a promotion to encourage consumers to make mobile payments. This technology is possible by equipping point-of-sale terminals (cash machines) with near-field…

Oversharing on Social Media Common Amongst 50+

…fraud and identity theft, 52% have shared their email address, 27% their mobile phone number and 26% their home address. All things that open them up to possible exploitation and even physical harm. They are also using their mobile devices to share information. Nearly one in four (24%) mobile users have used their device to send personal or intimate text messages, emails or photos to someone and yet over 30% do not have basic password protection…

5 Ways To Protect Your Mobile From Prying Eyes

…ice need a warrant to search your phone. #2 Lock down your Phone Encrypting important data is crucial for those who want to keep prying eyes—be they the police, a vindictive ex or a nosy coworker—from gaining access to their mobile device. The method of encrypting varies from one mobile device to the next, but here are some guidelines: Android and iOS phones come with native data protection for encrypting. Take advantage of this. Remember, other…

7 tips to a secure mobile device

…ly got access to Facebook and I’ve deleted most of them, but it’s been a harrowing experience.” There are just so many things wrong with this. It’s amazing to me how lazy some people can be with their mobile security—especially if their devices have, ahem, “private” information on them. Passwords: Mobiles need to be password protected and automatically locked after one minute. A four- to…

NFC app on androids facilitates automation

…n your phone detects your own WiFi signal. The current triggers are as follows: NFC Bluetooth WiFi Battery level Location Time triggers And here are a few examples of the actions that you can perform: Change WiFi, Bluetooth, mobile hotspot, airplane mode, auto-sync, GPS (root users) and mobile data settings. Change your volume or notification tones. Change your display brightness, timeout, auto-rotation or notification light settings. Check in…

Why mobile security is a must

…at what makes smartphones smart is the fact they are nothing less than small computers with the same power and reach as desktops or laptops. The only difference is they fit in your pocket.) It is as essential to protect your mobile as it is to protect your PC. You need to make sure you protect yourself, as our mobile devices are our most personal of personal computers. Here are some things you should do to protect yourself: Use a PIN code and…

Mobile, wearable and now…implantable technology?

…es. Samsung has a smartwatch, and Google, Apple and Microsoft are buying up companies that have patented smartwatch technology or are hiring engineers to create it. Smartwatch technologies are supposed to work in tandem with mobile phones and computers to become the third leg of the “smart” ecosystem. And with wearable fitness gadgets that sense heartbeat, pulse, the number of steps you take, and the quality and duration of your sleep, it’s just…

4 Tactics Cybercriminals Are Using to Steal From Us

…o steal your information, spy on your phone activities, or take your money. Halfway through 2013, McAfee Labs has already collected almost as many mobile malware samples as it did in all of 2012. The motivation for deploying mobile threats is rooted in the inherent value of the information found on mobile devices, including passwords, contacts and access to financial information. You need to be proactive and protect your mobile devices with…

Making a Case for Mobile Payment

…sed. Only download mobile payment applications from a reputable app store. Check user reviews of the app and make sure to read the app’s privacy policy regarding what data of yours it is accessing and sharing. Don’t conduct any mobile transactions over an unsecured WiFi connection. It’s much more secure to use your mobile data network. Keep your mobile software current. This includes installing the latest updates for your operating system,…

Serious Growth for mCommerce in 2012

…com, which each earned a 74 in the ratings. The study shows that the mobile platform is maturing faster than the traditional web. But this will also mean criminals are moving to mobile as an attack vector. To stay safe while mobile shopping: Keep mobile security software current. The latest security software, web browser and operating system are the best defenses against viruses, malware and other online threats. Automate software updates. Many…

How the Proliferation of Mobile Devices is Impacting Consumer Security

…uised as a picture or audio clip. When you click a link or open an attachment, malware installs on your device. Unlike early PC malware, it doesn’t ask your permission, and your device is figuratively in their hands. How are mobile devices changing the game? Criminals know that your mobile device is an indispensable extension of your life. Your smartphone or tablet stores some of your most private conversations and confidential information. It…

Securing Your Mobile in Public Places

…ere are also third-party programs that do the same thing and are often bundled with antivirus. Install mobile security software There was a day when PCs didn’t need antivirus; now there are millions of viruses targeting PCs. Mobile devices didn’t need antivirus either, but today there are thousands of viruses targeting mobiles. Use a private VPN Logging into public WiFi without any encryption puts all your information at risk. Install a wireless…

What is Mobile Banking? Is it Safe?

…re offered over SMS, but with the introduction of smartphones and the Apple iOS and Google Android operating systems, mobile banking is now primarily offered through applications as opposed to through text messages or even a mobile browser. Mobile banking allows you to review transactions, transfer funds, pay bills and check account balances via your mobile device. MBanking also offers enhanced security with SMS transaction notifications and the…

5 More Mobile Security Tips

A cybercriminal’s full time job is creating new crimes, and he or she will make full use of technology to hide their activities to fool you. And with mobile devices, this is no different. The threat to our mobile devices is also high because our smartphones are always connected, they usually carry some personal data, and they are even equipped with small cameras, microphones, and positioning devices (just like the spies carried in old movies)….

5 Mobile Security Tips

…and make sure that it appears legitimate by reviewing the URL or rather than doing a search for a site, type in the correct address in the URL bar to avoid running into any phony sites. Secure your device: Make sure all your mobile devices have comprehensive security software, likeMcAfee Mobile Security or McAfee LiveSafe (for all your devices) that protects you from threats, helps you avoid risky websites and malicious apps, and in the event of…

What is a mobile wallet?

…near field communications (NFC) and applications. Depending on which is used, a user might need to wave their phone near a reader to make a payment or verify identification, or they may open an app and simply click a button. Mobile wallet is still in its infancy but the technology is quickly gaining steam. Google introduced Google Wallet, a mobile app that turns your Android phone into a wallet by securely storing your credit cards on your…

What is mCommerce and how do you keep transactions safe?

…hase over the Internet or another type of mobile network. There are several different forms of mobile commerce: Mobile shopping: You comparison shop or purchase something online using your mobile device (and its browser or a mobile app) Mobile banking: You interact with your bank account (actions such as check the balance, transfer between accounts, make payments) using your mobile device Mobile wallet (mobile payments): The mobile device itself…

How do I protect mobile devices while traveling?

…or the keys work in multiple rooms.And ,of course, everyone on the staff has access. It’s important to never, ever leave anything of value in your room, always engage the security lock on the door when inside, and take your mobile into the bathroom with you. If you go to the fitness center or restaurant, take your mobile with you or put it with other valuables in the safe (and don’t use a combination that’s easy to guess, like “1234”)! Public…

What are My Risks with My Mobile Device?

…fter a certain period of time Before downloading any app, check other users’ reviews to see if it is safe, and read the app’s privacy policy to make sure that it is not sharing your personal information Carefully review your mobile phone bills for any anomalies Use comprehensive mobile security that include anti-theft, antivirus and web protection like McAfee Mobile Security or McAfee All Access Robert Siciliano is an Online Security Expert to…

What is malware and why should I be concerned?

…puters, but also ones that apply to mobile devices. Currently most mobile malware is spread by downloading an infected app so you need to be aware of what sites you download apps from and what permissions it accesses on your mobile device. Mobile malware can also spread via text messages (SMS). Scammers send phishing messages via text (called SMiShing) to try and lure you to give up personal or financial information or sign you up to premium…

What Should I Know about Mobile Cybercrime?

…messaging fraud – Cybercriminals have figured out how to incorporate text messaging (SMS) into banking frauds. When you log on to perform a transaction (like checking your balance), banks often send a validation code to your mobile device via SMS. Banks figure if you are logging onto their website through your mobile device, a separate authentication through text messaging will help ensure that it’s really you logging in and provide an extra…

10 Tips to Secure Online Banking

…is being offered primarily through applications as opposed to over text messages or a mobile browser. As convenient as this is, you still need to consider security. Set a passlock that times out in one minute to access your mobile. Set your computer’s and mobile’s operating systems to automatically update critical security patches. Make sure your PC’s firewall is turned on and protecting two-way traffic. Always run antivirus software on your PC…

Why are Cybercriminals Moving from PCs to Mobile Devices?

…e provider immediately. Never respond to text or voicemail with personal information like credit card numbers or passwords Never click on a link in an email, social networking site or message from someone you do not know Use mobile devices security like McAfee Mobile Security, or McAfee All Access which protects all your devices Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your…

What You Should be Aware of When Using Your Android Device

…app, make sure you review the permissions it’s accessing on your device. And use an app protection feature that warns you if your apps are accessing information on your mobile that it doesn’t need to. Install a comprehensive mobile security solution like McAfee Mobile Security that includes anti-malware as well as web protection, anti-theft and app protection features. Or if you want to protect all your devices, including your mobile devices,…

More Than 30% of People Don’t Password Protect Their Mobile Devices

…r me” function on your apps or mobile web browser, and take care to log out of your accounts Consider not sharing your PIN/password—this might be a tough one, but in the long run it will save you from possible heartacheUse a mobile security product like McAfee Mobile Security (and also McAfee All Access), that has not only anti-malware, but web protection and app protection. With app protection, not only are you warned if your apps are accessing…

Risky Mobile Applications Plague Users

…nlike PCs where infections typically happen through email (attachments or links) or from visiting an infected website, for mobile devices, malicious software (malware) is distributed primarily through infected apps. In their Mobile Security: McAfee Consumer Trends Repor t , McAfee analyzed data from McAfee Mobile Security users on Android devices and found: 16% (or 1 in 6) of apps are infected with malware or contain links to risky URLs 40% of…

Mobile Security Myths

…nvenient in many ways, it also brings about new security risks that many people don’t think about. For example, most of us know that we need to use security software on our PCs. But how many of us know to use security on our mobile devices? Mobile devices are our most personal computers, yet they open the door to many vulnerabilities that don’t exist on a traditional PC. Here’s some fact vs. fiction around mobile devices: Mobile Myth #1: The…

Maximizing the Use and Efficiency of Your Mobile Device

…t of reminding. Docs: Yes, I use Google Docs too. There are dozens of documents I need access to wherever I am. I have yet to find a more efficient program than Google Docs to safely store and access my documents right on my mobile. Google Chrome browser: The beauty of this browser on your desktop and on your mobile device is in that you can access whatever tabs you have open on your desktop from your mobile and vice versa. All this works just…

What Can We Expect in 2013?

…ceive their purchases without any negotiations or direct contact with the seller.                     Here’s some 2013 security resolutions: Install security software on your mobile device—With the growing amount of mobile threats that we’re seeing, you want to make sure that your smartphone is protected, just like your computer. Consider installing security software such as McAfee Mobile

Losing a Mobile Phone Doesn’t Have To Stink

…o return it to you. Write down the serial number—Record your phone’s serial number and store it somewhere other than on your device. If you lose your phone and it eventually turns up, you will be able to identify it. Install mobile security—Software like McAfee® Mobile Security, which includes antivirus protection, app protection, backup and restore functions, and remote wipe and tracking in the case of loss or theft Robert Siciliano is an…

Mobile Malware is Here: Beware!

…m software updated Be selective about websites you visit Avoid clicking links in text messages or emails, especially if they are from people you don’t know Stay educated on the latest tricks, cons and scams Use comprehensive mobile security, like McAfee Mobile Security that includes antivirus, anti-theft, and web and app protection or comprehensive device protection like McAfee All Access that protects all your devices including your mobile

What Threats Are Unique To My Mobile Device?

…ch more susceptible to viruses and malware because users can avoid Apple and Google application vetting processes that help ensure users download virus-free apps. Expect more scams and more scam warnings directed toward your mobile devices going forward. As mobile cybercrime evolves and criminals begin to make some money, they will have the resources to hire crackerjack programmers to do their deeds. The time is now to secure your devices….

Actress Sofia Vergara’s Personal Photos Hacked or Stolen Via Mobile

…one unattended in a public place Put a password on your mobile Set your phone to auto-lock after a certain period of time When doing online banking and shopping, always log out and don’t select the “remember me” function Use mobile device protection that provides anti-theft Mobile device protection can be used to backup and restore the information on your phone, as well as remotely locate it and wipe data in the case of loss or theft. Plus…

4 Best Practices for BYOD Policies

…that needs to be downloaded and installed. This security application will have a certificate authenticating the device with terms and conditions to connect to the company network and run yours and the companies programs. The mobile management application will provide the enterprise the ability to remotely control your mobile and wipe data. Don’t do this if you don’t plan on agreeing to the BYOD policies Expect the security application to have…

Mobile Device Security in a BYOD World

…eal world there is little difference between an employer’s issued device and a personal mobile device. The most important difference should be that a digital device issued by your employer requires and should have a “company mobile liability policy”. Businesses generally provide and pay for employee mobile devices, and also strictly dictate what you can or cannot do on the device. For IT security reasons, the employer may have remote…

Are Your Mobile Apps Up To No Good?

…apps you should: Research apps by checking their ratings and reviews before you download Only download apps from reputable apps stores Read the Terms of Service (TOS) to determine what data the app is going to access on your mobile device. Use comprehensive mobile security app with app privacy features, such as McAfee Mobile Security, that will provide insight into the activity and safety of your apps Robert Siciliano is an Online Security…

Mobile Security App Surpasses 1 Million Downloads on Google Play

…d with and/or may be sending personal data to risky sites, such as adware and spyware networks. To protect your personal information, finances and privacy from being exposed through apps: Research apps and their publishers thoroughly and check the ratings before installing. Purchase apps from a well-known reputable app store market Watch for permissions (stay away from installing apps that don’t look right) Install comprehensive mobile security…

What Are The Risks Of A Lost Or Stolen Mobile Device?

…an ever. For a lot of us, it can also be a nightmare if it’s lost, stolen or hacked, especially since today it’s become our most personal computer, But despite the fact that 1/2 of of us would rather lose our wallet than our mobile phone, only 4% of us have taken steps to protect our mobile device with security. For most of us, our first reaction when we lose our wallet is I have to cancel my credits cards, get a new license, etc. When we lose…

What Are The Risks Of A Lost Or Stolen Mobile Device?

…eens and keyboards are easier targets for “over the shoulder” browsing. Below is an infographic that shows why you should protect your smartphone and some tips to protect you and your device.   Take time to protect your mobile device. Here’s some tips to keep your mobile safe: Never leave your phone unattended in a public place Put a password on your mobile and set it to auto-lock after a certain period of time. If you use online banking…

Understanding Your BYOD Policy

…igned. At a minimum expect the application to have the ability to locate your mobile if its lost or stolen via the phone’s GPS, lock your phone locally whether you want to or not, (by default you have to choose 1-5 minutes). Mobile security software apps should also remotely wipe your mobile of all its data. Having encryption, antivirus and a firewall is a key factor in protecting data. Robert Siciliano, personal security expert contributor to…

Mobile Security Apps and Tips

…security option on the iPhone. And most PINs are weak as well as short. Five basic combinations ¾ “1234,” “0000,” “1111,” “2580,” or “0852 ¾ make up more than 10% of all PINs. Install antivirus protection: Just like on a PC, mobile antivirus products should provide real-time protection against viruses, worms, spyware, Trojan horses, and battery-sapping malware. Adequate mobile antivirus protection guards against threats that originate via email,…

Watch for New Attacks Aimed at Mobile Devices

…load mobile payment applications from a reputable app store. Check user reviews of the app and make sure to read to app’s privacy policy on what data of yours it is accessing and sharing. Don’t do any mobile transactions over unsecured Wi-Fi connection. It’s much more secure to use your mobile data network. Keep your mobile software current. This includes the latest updates for your operating system, mobile browser and mobile security software…

Mobile Payment Update: Who Will Take the Lead This Summer?

As summer heats up, so does mobile payment – a hot topic between major credit card companies, mobile carriers, and mobile manufacturers. First, to give you some perspective, let’s cool down and cite some statistics from November of last year, when “Cyber Monday” was the most successful ever; and mobile purchases skyrocketed on Black Friday. U.S. shoppers made nearly two and a half times as many purchases through eBay Mobile on Black Friday 2011…

How Does Jailbreaking Or Rooting Affect My Mobile Device Security?

…laptops, and desktop PCs, and billions of applications are downloaded—risks of mobile crime will rise. Not only do you need to stay educated about the latest threat and scams, you should also make sure you havecomprehensive mobile security installed on your mobile device. And remember, jailbreaking or rooting your mobile device can open you up to security risks that don’t make it worth doing so. Robert Siciliano is an Online Security Evangelist…

Is There A Risk With Using My Personal Device For Work?

…e it right to work and request the IT department to set it up with your work email and allow access to the company network. “Bring your own device” (BYOD) has become widely adopted to refer to workers bringing their personal mobile devices, such as smartphones, tablets and PDAs, into the workplace for use and connectivity. Many of us need a mobile device for work and personal use and don’t want to carry two separate devices, but this can cause…

Safe Searching on Your Mobile Device

…e person or company. That’s why going it alone in search isn’t a good idea. Just like it is essential to have antivirus, antispyware, antiphishing and a firewall on your PC, it is equally essential to have protection on your mobile. McAfee Mobile Security provides comprehensive mobile security that includes antivirus, anti-theft, app protection, web protection and call and text filtering. Web protection comes with McAfee Mobile Security and…

Are Tablets Just As Vulnerable As Mobile Phones?

…“remember me” function Before downloading a third-party app, check other users’ reviews to see if it is safe, and read the app’s privacy policy to make sure that it is not sharing your personal information Use comprehensive mobile security software like McAfee Mobile Security which include antivirus, anti-theft, web protection, privacy protection and call and text filtering. If you have multiple notebooks, netbooks, smartphone and tablets,…

Mobile Wallets—How I Make Mobile Payments Securely

…you carry in your pocket or purse will become obsolete. The plan is to eliminate all our credit cards, store cards, and IDs and use our mobile phones as our primary means of commerce and identification. The technology behind mobile wallet or mobile POS (point of sale) basically turns your smartphone into a smart debit or credit card. Soon you will be able to pay for almost anything via your mobile device. When mobile wallets and mPOS become more…

What Are The Risks Of Mobile Spam?

…from an organization and don’t recognize the sender, don’t open the text or unsubscribe from the list, since this lets the spammer know that your phone is active. The best thing to do is just delete the message. Protect your mobile phone number – Don’t give your mobile number to companies or people you don’t know. And, if you do need to give out your mobile number, make sure you should understand the company’s privacy policy to see if your…

Mobile and Phishing – Why It’s More Dangerous

…ss, it’s difficult to tell if the website or sender is legitimate. You also can’t “hover over” a link like you can from your computer and get a preview of a linked word or graphic. Another factor is the “always on” nature of mobile devices. Most mobile users are more likely to immediately read their email messages and forget to apply their security practices, such as checking to see if an email is from someone they know and if any included links…

Your New Best Friend May Not Protect You

…friend, colleague, or company as a result of an action I’ve taken, I don’t click links, since they can often result in your device becoming infected with malware. And it’s much harder to see if a link is not valid from your mobile device vs. your computer. Install mobile security: Comprehensive security is as important and necessary for your smartphone as for your PC and even your Mac. And don’t forget that just like your computer, you need…

Online Banking Vs. Mobile Banking

…ounts. Mobile banking is very popular internationally. In some parts of the world, traditional banking infrastructure is not consistently available, and so mobile banking is the primary banking option. With a few exceptions, mobile banking, typically conducted via mobile application, offers the same basic features as browser-based online banking. In particular, mobile banking emphasizes “transactional” features, such as bill payments, check…

Banking – How to Balance Security and Convenience With Online and Mobile Banking

…tion notifications and the ability to turn card accounts on or off, and new technologies like mobile check deposit, in which you simply take a cell phone picture of the check, are contributing to the increasing popularity of mobile banking. Eventually, mobile phones may even replace ATMs and credit cards. As convenient as this is, you still need to consider security. Set a passlock to access your mobile that times out in one minute. Set your…

McAfee Mobile Security Delivers at Mobile World Congress

…ed control to identify, secure, and assign policies to both employee- and business-owned smartphones and tablets. The concern for IT professionals is “BYOD” (Bring Your Own Device) which has become widely adopted to refer to mobile workers bringing their own mobile devices, such as smartphones, tablets and PDAs, into the workplace for use and connectivity. Today, many consumers expect to be able to use personal smartphones and mobile devices at…

How Safe Is Paying With Your Phone?

mCommerce, or mobile commerce, refers to financial transactions conducted via smartphones or other mobile devices. But are mobiles really meant for financial transactions? While about a third of mobile phone users remain unwilling to dabble in mCommerce due to identity theft concerns, the majority of users are apparently comfortable making purchases with their phones, just as they would with a PC. mCommerce’s strength is the variation between…

Analysts Expect Explosion in Mobile Malware

…e security solutions that include antivirus, anti-spyware, anti-phishing protection, anti-spam and firewall protection. As smartphones gradually eclipse PCs in usage volume, criminals will direct their malware efforts toward mobile devices. But at present, the world of mobile security offers very few options. According to McAfee Labs™, “nearly all the types of threats to desktop computers that we have seen in recent years are also possible on…

How will NFC change the mobile wallet?

…ve NFC capability by 2015. The short list of big players, which includes Google, Citibank, MasterCard, Gemalto, First Data, VeriFone, Samsung, Sprint, AT&T, T-Mobile, Verizon and Isis, are all deploying some version of a mobile wallet. Isis’s website promises, “Mobile wallet will eliminate the need to carry cash, credit and debit cards, reward cards, coupons, tickets, and transit passes, fundamentally changing how you shop, pay, and save….

Do You Have A False Sense of Cybersecurity for Mobile?

…And according to Gartner, 113 mobile phones are lost every minute in the U.S. alone. With unit sales of smartphones and tablets eclipsing those of desktop and laptop PCs, cybercriminals will continue setting their sights on mobile, and increased mobile Internet use will continue exacerbating security and data breach issues. Protect yourself: Use mobile security software and keep it current. Having complete mobile security protection like that…

Which Will Make a Bigger Splash in 2012, Mobile Wallet or EMV?

…r companies that have wagered heavily on the presumed success of their chosen technology, and these companies have a vested interest in the failure of their rivals. Personally, I think there is more than enough room for both Mobile Wallet and EMV. Google recently introduced Google Wallet, a mobile app that turns your phone into a wallet by securely storing your credit cards on your phone, as well as promotional offers. When you make a purchase…

Safe Banking On Your Mobile Device

…e application, so you can be sure you are visiting the real bank every time, not a copycat site. Configure your device to auto-lock after a period of time. Don’t store data you can’t afford to lose on an insecure device. Use mobile security protection like McAfee Mobile Security™ that offers layers of protection including: antitheft, antivirus, antispyware, antiphishing and app protection. Robert Siciliano is an Online Security Evangelist to…

Marketers (and Criminals) Buzz About Mobile Tuesday

…reported that consumers increased shopping on smartphones and tablets on Black Friday. Purchases made on mobile devices accounted for 9.8% of online sales, which is up 3.2% from last year. GSI announced a 254% increase in US mobile sales on Black Friday. PayPal Mobile announced a 516% increase in global mobile payment volume over last year, and eBay Mobile reported US purchases were nearly two and a half times what they were last year.”…

Mobile Banking More Secure Than Computer E-Commerce?

Mobile banking is on the rise for more reasons than convenience sake. In truth, it’s more secure than traditional online baking. Accessing your banks mobile website or using your banks mobile application is inherently more secure than using a computer. Why? Computers are big targets for thieves. PC’s mostly run on Microsoft’s most hacked operating system, they typically contain a great deal of data, and they are vulnerable to viruses created by…

Standards Will Bring Mobile Payment

…iety of forms and there are multiple players trying to makes theirs a standard. Bank Systems Technology reports the disagreements involve banks, credit card companies and the third party technologies all coming together with mobile carriers. The mobile carriers want to control near-field communication and mobile payment fees by maintaining control over the phones payment technology containing their users’ credentials. Mobile carriers see…

Mobile Phone Operating System Insecurity

…ated by this lack of coordination. Mobile phone spyware has been a concern for years. Legitimate software companies sell mobile phone spyware that allows the user to monitor a spouse, kids, or employees. And criminals deploy mobile phone spyware, as well. Beijing-based mobile security services firm NetQin Technology reports that an application called Xwodi, which allows third parties to eavesdrop on cell phone conversations, has infected more…

Should You Worry About Smartphone Security?

…ructure attacks in 2011. As reported by BoingBoing, former Google Android security framework engineer Chris Palmer, who is now technology director of the nonprofit Electronic Frontier Foundation, addresses the risks posed by mobile operating system manufacturers’ lax approach to security: “Mobile systems lag far behind the established industry standard for open disclosure about problems and regular patch distribution. For example, Google has…

Mobile Banking Becoming an E-Commerce Staple

…r than a PC. The earliest mobile banking services were offered over SMS, but with the introduction of smartphones and Apple iOS, mobile banking is being offered primarily through applications as opposed to text messages or a mobile browser. Mobile banking reduces expenses by allowing customers to review transactions, transfer funds, pay bills, and check balances without relatively expensive phone calls to a bank’s customer service call center….

Mobile Payment Set to Dramatically Increase

…that the user scans at the register. The statistics for mobile payment are impressive. The U.S. mobile payment industry encompasses a number of categories, including mobile bill payment, mobile point of sale, m-commerce, and mobile contactless. Mobile bill payment, in which consumers pay bills via mobile phone, currently makes up the bulk of the U.S.’s mobile payment industry. Mobile point of sale, in which a consumer’s phone is used as a point…

Five Mobile Operating System Options

…ket share has declined from over 50% in 2009 to about 30% in 2010. Last month, Nokia announced a partnership with Microsoft, which will replace Symbian OS with Windows’ operating system. Windows Mobile 7: Less than 5% of all mobile phones run Windows Mobile 7, which took over where Windows Mobile left off. This is a closed-source operating system that can be managed through Microsoft Exchange. Microsoft’s mobile industry market share has…

The Rise of Smartphones

…e broadband subscriptions surpassed the half billion mark in 2010, and in 2011 broadband subscriptions are expected to exceed one billion. As more and higher speed networks are built, more consumers will gravitate toward the mobile web. Smartphone users are downloading billions of apps and spending millions via mobile payments. In fact, for the younger generation, smartphones are used for a majority of ecommerce transactions. Many of these…

Software Makes Dumbphones Smart for Facebook

…SIM-compliant mobile phones. From Wikipedia: “A subscriber identity module or subscriber identification module (SIM) on a removable SIM card securely stores the service-subscriber key (IMSI) used to identify a subscriber on mobile telephony devices (such as mobile phones and computers). The SIM card allows users to change phones by simply removing the SIM card from one mobile phone and inserting it into another mobile phone or broadband…

Mobile Payment is Coming

…nts, in which you pay by holding your phone near the payment reader at the register, are expected to increase by 1,077% by 2015. According to a study by Boston-based research firm Aite Group, “The gross dollar volume of U.S. mobile payments is estimated to grow 68 percent between 2010 and 2015, but the mobile payments will continue to represent only a ‘tiny portion’ of U.S. consumer spending for many years.” Mobile payment is still in the…

Mobile Phone Security Under Attack

As mobile Internet usage continues its rapid growth, cyber criminals are expected to pay more attention to this sector. Mobile device platforms compete for content creators’ latest innovations, which often require more and more device access. As applications and other content are more widely distributed, security breaches will be inevitable. The speed of technological advancement and the demand for new products and services make mobile phones…

Stalkers Exploiting Mobile Phones

Mobile phone GPS (global positioning system) is often accurate in less than 100 feet. Many mobile apps work with GPS to inform you of local restaurants, banks, gas stations and attractions. Mobile phone GPS is also being used for driving navigation too, but I don’t find it as effective. In this amazing age of progressive technology the uses seem unlimited. The good guy often finds out what he can do to improve his life with technology and the…

Mobile Phone Becoming Bigger Target For Hackers

…e McAfee introduce anti-malware solution to secure Android-based smartphones, then you know mobile phone hacking has gone mainstream. The McAfee® VirusScan® Mobile technology is available now for users of Android and Windows Mobile-based smartphones providers. The scary part is mobile phone spying software is affordable and very powerful. I worked with Good Morning America (GMA) on this issue. GMA found thousands of sites promoting cell phone…

Identity Theft Expert and MyLaptopGPS: Unsecured Mobile Computers Facilitate Noted Increase in Risk of Data Breaches Following Layoffs

…net, the software employs laptop GPS to silently retrieve and then delete files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost mobile computing device. YouTube video shows Siciliano on a local FOX News affiliate discussing the importance of securing mobile computing devices on college campuses, where laptop theft can run rampant. To learn more about…

Identity Theft Expert and MyLaptopGPS Note That Rise in Security Technology Spending Needs to Encompass Laptop Computers

…nnected to the Internet, the software silently retrieves and then deletes files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost mobile computing device. YouTube video shows Siciliano on a local FOX News affiliate discussing the importance of securing mobile computing devices on college campuses, where laptop theft can run rampant. To learn more about…

Identity Theft Expert and MyLaptopGPS: Organizations Must Protect Employee Data Stored on Mobile Computing Devices

…en or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer. Additionally, MyLaptopGPS offers SafeRegistry™, a comprehensive system for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods™, cell phones, BlackBerry™ devices, and other mobile property. Readers may download a…

Identity Theft Protection Expert and MyLaptopGPS: Computer Thefts Affect College Students and Highlight Need for Better Laptop Security

…en or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer. Additionally, MyLaptopGPS offers SafeRegistry™, a comprehensive system for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods, cell phones, BlackBerry devices, and other mobile property. Readers may download a…

MyLaptopGPS and Identity Theft Expert: Loss of Laptops Belonging to Health Insurers Have Placed Hundreds of Thousands at Risk of Medical Identity Theft

…the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer. MyLaptopGPS also offers SafeRegistry™, a comprehensive system for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods, cell phones, BlackBerry devices, and other mobile property. A downloadable demo of…

Identity Theft Expert and Speaker on Personal Security: Just Two Laptop Thefts Reported on Same Day Left as Many as 328,000 Unique Data Records in Jeopardy

…the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer. MyLaptopGPS also offers SafeRegistry™, a comprehensive system for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods, cell phones, BlackBerry devices, and other mobile property. A downloadable demo of…

Identity Theft Expert and Speaker on Personal Security Cites Research in Call for Organizations of All Kinds to Improve Their Mobile Computing Security Measures

…the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost computer. MyLaptopGPS also offers SafeRegistry™, a comprehensive system for inventorying entire fleets of mobile computers. A downloadable demo of MyLaptopGPS is available. “Laptop computers, along with the ancillary devices and networks that make them truly mobile in functionality, are ripe targets for thieves,”…

Identity Theft Expert and Speaker on Personal Security Encourages IT Departments to Secure Their Laptop Computer Fleets with Internet-based GPS

…ernet-based GPS and other data and hardware-protection technologies, he pointed to affordable solutions. “To the industry observer reading the daily news,” said Siciliano, “the lack of security for data and mobile hardware must seem like an insurmountable problem, an intractable situation. But affordable solutions already exist that easily make laptop computers and the data on them highly secure. Smart organizations understand…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in