Archives - Mobile Security


Downloading apps: don’t let appearances fool you

In today’s digital world, apps have become an indispensable part of our daily lives. While downloading apps from official app stores like the Apple App Store and Google Play is generally safer than sideloading or acquiring them from third-party sources, it’s important to remember that even official apps can pose security and privacy risks. Not […]

Understand man-in-the-middle (MITM) attacks

Imagine someone silently intercepting your conversation with a friend, listening to your every word. That’s essentially what a man-in-the-middle (MITM) attack is – an attacker secretly intercepts and alters communication between two parties. A common example is when someone steals information from a user connected to a public Wi-Fi network. The attacker can easily intercept […]

Review app permissions regularly

Protect your digital privacy by regularly reviewing and managing app permissions on your devices. This practice involves comprehensively scrutinizing each app’s access to your device’s features and data. Be discerning in granting permissions, providing access only to the resources apps genuinely require for their functionality. Regular reviews ensure that apps do not have unnecessary or […]

Set important apps and updates to install automatically to stay safe

Software updates are essential for keeping your devices and networks secure. They fix bugs and patch security vulnerabilities that cybercriminals can exploit. Most apps on Android and iOS are set to update automatically by default. You can also schedule big installations, like OS updates, in advance. This is better and safer than having to apply […]

Utilize biometric authentication for sensitive apps

Biometric authentication is considered one of the most secure and convenient methods of user authentication for sensitive applications. This technology leverages fingerprint recognition, facial recognition, iris scanning, voice recognition and — in certain cases — behavioral biometrics to facilitate streamlined, secure access.  This approach eliminates the need for memorizing and managing complex passwords, making it […]

Configure your smartphone to automatically lock after a short period of inactivity

While there’s no one-size-fits-all for how long it should take for your phone to lock following inactivity, generally, the earlier, the better — though, not at the complete expense of convenience. Consider setting an automatic inactivity lock on your smartphone after approximately five minutes or fewer, depending on preference. This, in turn, will help improve […]