Mobile App Permissions: Are Users Really the Problem?

Mobile App Permissions: Are Users Really the Problem?

While there have been a lot of news-worthy events in the past couple of years involving corporate breaches, one thing has not changed. Users are still considered the greatest obstacle to information security. Whether it is phishing, opening infected attachments, or “just being stupid and lazy”. Our focus in this article will be on the […]

Share

Syncing Android Devices: Use Google or Die?

Syncing Android Devices: Use Google or Die?

Is it just me or are mobile phone carriers being forced by Google to remove the local synchronization options from their offerings of Android devices? It seems that it is a lot more work syncing Android devices these days. I have always used Nokia phones and that manufacturer provided the option to sync the data […]

Share

Why Google’s Malware Bouncer Is Not Enough

Why Google’s Malware Bouncer Is Not Enough

Google recently revealed that it had a malware scanner for the Android OS that automatically scans the code of apps uploaded to the Android Market. The service, which Google gave the codename of ‘Bouncer’, is said to look for behavior that are deemed unacceptable by the company. But the problem with Android Apps go beyond […]

Share

Try Any of Our Services for 30 Days!

Share
Share