Latest Social Media News
112.8K views | +0 today
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

How Hackers Use App Ads to Get Your Information

How Hackers Use App Ads to Get Your Information | Latest Social Media News | Scoop.it

 

With the threat already in ads, are mobile users left vulnerable to attacks?

 

Though developers need to be very careful installing ad networks in their apps, users can still protect themselves by

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 


Via Gust MEES
Gust MEES's curator insight, August 16, 2013 8:37 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Gust MEES's curator insight, August 16, 2013 8:40 AM

 

===> making sure that the Android system setting ‘Unknown sources’ is unchecked to prevent dropped or drive-by-download app installs and installing security apps like Lookout to as their first line of defense against malware. <===

 

Learn more:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gerrit Bes from 21st Century Tools for Teaching-People and Learners
Scoop.it!

DroidSheep Guard - Applications Android - CyberSecurity

DroidSheep Guard - Applications Android - CyberSecurity | Latest Social Media News | Scoop.it
DroidSheep Guard protects your phone from DroidSheep, Faceniff & other hijackers DroidSheep Guard protects your phone from Tools like DroidSheep, Faceniff and other Se...

Via Gust MEES
Gust MEES's curator insight, April 14, 2013 9:22 AM

 

Awareness and Protection!!!

 

Gust MEES's curator insight, April 14, 2013 9:25 AM

 

Awareness and Protection!!!


Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses

Security Firm Finds Bevy Of Mobile Vulnerabilities, Serious Lapses | Latest Social Media News | Scoop.it
Security firm Cenzic said it found serious mobile application vulnerabilities, such as dangerous Web service errors, in an analysis of the mobile apps it reviewed in 2012.

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 


Via Gust MEES
Gust MEES's curator insight, March 7, 2013 5:49 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.


Gust MEES's curator insight, March 7, 2013 5:52 PM

 

An analysis of the thousands of applications reviewed by Web application security firm Cenzic found serious lapses in judgment resulting in gaping holes that could be used by an attacker to siphon off sensitive data from smartphone and tablet owners.

 

Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Beware of Malware: Mobile Security Apps to Safeguard Your Phone

Beware of Malware: Mobile Security Apps to Safeguard Your Phone | Latest Social Media News | Scoop.it
Malware attacks on mobile devices are on the rise. Lookout and Avast can help protect your smartphone from hackers and thieves.

 

=================================================

 

Gust MEES

 

Check out also here:

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free?tag=Mobile-Security

 

http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

 

=================================================


Via Gust MEES
Zhao KQiang's curator insight, March 27, 2014 7:03 AM

focus on the how apps effect on the phone security

 it recall me to check the apps of my phone

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [Infographic]

Why You Should Care About Mobile Security [Infographic] | Latest Social Media News | Scoop.it

 

Article by Neil DuPaul

 

The BYOD revolution. You’ve heard of it, you know it’s coming, some believe it’s already here. Is it inevitable? Will it change the way we do business? No matter what you believe, you need to understand the security threats that come along with BYOD and how to best protect yourself and your business against them. Join Joe Worker and Joe IT as we walk you through the basics of BYOD and mobile security!

 

Read more:

http://www.infosecisland.com/blogview/22567-Why-You-Should-Care-About-Mobile-Security-An-Infographic.html?utm_source=dlvr.it&amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

How do cyber criminals get your data? What do they do with it?

How do cyber criminals get your data? What do they do with it? | Latest Social Media News | Scoop.it

By now, most everyone has heard the story: on April 23rd, the AP’s twitter account was “hacked.” The tweet, which was a fairly obviously fake, still managed to send Wall Street into a panic. The Dow Jones Industrial Average dropped 145 points in 2 minutes.

 

So why is this important? It highlights the reality of the threat landscape.

 

The point of the story is that mobile security isn’t just about protecting you from viruses. Threats don’t only come in the form of malicious applications that one inadvertently “sideloads” onto his or her device. Mobile security is also about making sure your data is protected.

 

It doesn’t matter whether the economic climate is good or bad, there is always a market for fraud. The marketplace for carding is growing and will continue to grow. And as the engineers behind these types of attacks get smarter and smarter, we can only expect to see them more and more often.

 

 

 

 

 


Via Gust MEES
Gust MEES's curator insight, May 14, 2013 5:11 PM

 

Read the full article to understand really...

 

Learn more:

 

http://gustmees.wordpress.com/2013/05/12/cyber-security-the-weakest-link-in-the-security-chain-is-the-human/

 

http://gustmees.wordpress.com/2013/05/13/visual-cyber-security-see-attacks-on-real-time/

 

asma jmari 's comment, May 15, 2013 7:44 AM
thank you Gust MEES I'll check it out
asma jmari 's comment, May 20, 2013 6:34 AM
believe it or not they do and hacking is more like a hobby some do it for fun and some just dedicate themselves to it and make it a job
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Improving the security for Android embedded systems

Improving the security for Android embedded systems | Latest Social Media News | Scoop.it

 

McAfee has delivered a whitelisting security solution for Android based embedded systems. McAfee Application Control for Androidresides in the Android kernel, embedded in the operating system and provides protection from the installation or execution of a malicious application on an Android-based device. McAfee also provides protection at the application layer to Android devices.

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

VPN Shield

VPN Shield | Latest Social Media News | Scoop.it
Get VPN Shield on the Mac App Store. See screenshots and ratings, and read customer reviews.

 

Description

Protects your online privacy by warning about using the Internet in potentially unsafe locations, such as unprotected WiFi hotspots in hotels, and provides a safe and trustworthy connection with a VPN service subscription, or using your own VPN settings.


Via Gust MEES
Gust MEES's curator insight, January 19, 2013 7:29 AM
Description

Protects your online privacy by warning about using the Internet in potentially unsafe locations, such as unprotected WiFi hotspots in hotels, and provides a safe and trustworthy connection with a VPN service subscription, or using your own VPN settings.

 

===> A MUST when using public WiFi!!! <===

 

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | Latest Social Media News | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Mobile Devices: The Gateway for Hackers to Your Digital Identity

Mobile Devices: The Gateway for Hackers to Your Digital Identity | Latest Social Media News | Scoop.it

While it is widely understood that mobile devices are more than just phones – they are a lifeline to the outside world, entertainment platform, GPS system, little black book and a shopping and banking tool – it’s lesser known that these devices are also gateways. Mobile devices can be used by a hacker as an access point into many other aspects of your digital life as well the lives of others in your network, making mobile security about more than just protecting your phone.


Hackers can use your mobile device as an access point to data that have historically been exclusively stored to your laptop or desktop, such as social network and bank accounts. One of the most harmful (and popular) mobile threats has to do with apps. Installing apps from unknown or untrusted sources like apps outside the official Google Play Market could allow hackers to steal sensitive and private information stored on your mobile device including passwords, photos, contacts and location data.

 

=============================================

 

Gust MEES

 

Critical Thinking: "While it is widely understood that mobile devices are more than just phones", really!?? Most people still think that it is ONLY a phone, but in reality it is a mini computer with phone capabilities! And any computer is vulnerable and at risk!!!

 

Check out also:

 

http://gustmees.wordpress.com/2012/05/21/visual-it-securitypart2-your-computer-as-a-possible-cyber-weapon/

 

Especially check the video under this topic "Ever thought about that your smartphone is also a computer with phone capabilities?" to understand!

 

=============================================

 

Read more, a MUST:

http://blogs.mcafee.com/consumer/mobile-devices-the-gateway-for-hackers-to-your-digital-identity?utm_source=twitterfeed&amp;amp;amp;utm_medium=twitter

 


Via Gust MEES
No comment yet.