Archives - Mobile Apps


Carefully consider granting application permissions

Mobile apps often ask for numerous permissions, including access to your camera, contacts list and geolocation. Think hard before permitting them, since some applications only want these abilities for data harvesting purposes. For example, it’s not usually vital to give Facebook access to your location, or to let Instagram listen in on your microphone.

Update your mobile apps and operating systems often

Outdated applications and Operating Systems (OS) are a breeding ground for malware since they often have known vulnerabilities that can only be fixed by upgrading. If you see a new version is available, install it right away. Many platforms, such as Apple iOS, even allow you to automatically schedule security updates so you don’t miss […]

Pay attention to the permissions you’re giving to apps

After installing and opening a smartphone app, oftentimes your phone will ask if you’d like to give the app access to certain functionalities of your phone, such as your camera or microphone. You should be especially careful if it asks permission to access your data, such as your contacts. Even though there are security measures […]

Research apps before sideloading

If you use an Android device, you’ll learn that not every app is available on the Google Play Store. That means you’ll have to sideload the app, meaning you’ll have to download and install it manually. When you attempt to do this, Google will give you several warnings and you may even have to change […]

Remove mobile apps when you are finished

Many of us download apps for specific purposes, such as planning or a special event or vacation, and no longer need them afterwards, or we may have previously downloaded apps that are no longer useful or interesting to us. It’s a good security practice to delete all apps you no longer use.

Delete non-critical apps not used for 6 months or more

It’s common to have loads of apps on your devices, many of which you might not have opened in months or even years. Unless they include vital information or functionality, it’s usually sensible to delete them. Not only will you free up space, you’ll save yourself problems arising from their use of outdated or vulnerable […]