Blog

Third party apps

Third-Party Apps becomes significant source of Malware Attacks on Android Smartphones

  • 65
    Shares
 July 22, 2016

Estimated reading time: 3 minutes

We love options! But smart people also love the authenticity of the options available. Most of us rely on Google Play Store or Windows Store to download our favorite apps because they are the official pre-installed app for Android and Windows devices and hence, a trusted source. Google Play or...

Enterprise Security: Mobile ad libraries pose new security threats

 June 4, 2014

Estimated reading time: 3 minutes

A new threat to enterprise security that many organizations neglect and fail to address effectively is that of mobile advertising networks. These ad libraries are freely used by mobile developers to track user behavior patterns and to generate ad revenue. However, the increased usage of smartphones and tablets by employees...

The rise of WhatsApp Plus and should you install it?

 May 26, 2014

Estimated reading time: 3 minutes

The other day we received a rather interesting notification from one of our users about a service called WhatsApp Plus. While it sounds like a premium version of the original and hugely popular WhatsApp messaging service, after digging around a bit we have found that the circumstances surrounding this app...

Alert for users of Instagram, Bitly and Android and other security news

 May 10, 2014

Estimated reading time: 3 minutes

There is no such thing as a slow news day, as every week is filled with stories of hacked websites, stolen passwords, new variants of Android malware and other security updates. The computer and mobile security industry never sits still, and this week we have yet more reasons for you...

5 Tips for Online Smartphone Shopping Nobody Tells You About

 April 21, 2014

Estimated reading time: 4 minutes

The new Flipkart app is pretty amazing, isn’t it? If you haven’t tried it out as yet, you definitely should. However, there are several things you need to keep in mind when you make an online purchase through your smartphone. Most people wrongly believe that smartphones are malware free and...

Beware – Fake Google Apps Spotted Over Windows Phone Store!

 April 2, 2014

Estimated reading time: 2 minutes

Windows Phone has a worldwide market share of less than 5% in 2014, and this has led to its marketplace (known as the Windows Phone Store) being ignored by several app developers. The most prominent of these developers of course, is Google. Right now the only Google app that is...

Instagram: What you need to know – Part 2

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Instagram: What you need to know

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...

Why USB drives and CDs are a security risk to your corporate network

 February 26, 2013

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...