Archives - Mobile Security


Beware of copycat apps

It’s all too easy to accidentally install a malicious app on your phone. This could be because an app mimics a legitimate one; for example, if you want the Amazon Alexa app, make sure it’s the official software by Amazon by checking the source and reading the user reviews. Also, be wary of apps that […]

Time to get rid of your unused apps!

It’s not just about de-cluttering your closet or bookshelf, it also applies to any digital stuff you have, like your phone apps. Take a look through your phone and if you come across an app you haven’t used in a while (or ever!), get rid of it. You’ll be doing yourself a favor by reducing […]

Block unfamiliar phone numbers, particularly if they call you repeatedly

Phone call spam has gotten much worse throughout the 2020s, with many people receiving multiple scam calls per day. Most smartphones allow specific numbers to be blocked, which is worthwhile for any number that you don’t know and aren’t expecting any calls from.

Biometrics: Which popular phone has the best security?

Biometrics have come a very long way since the original smartphones. As a welcome alternative to constantly typing in your PIN or password every time you want to unlock the phone, biometrics are both convenient and secure. So how do the newest phones handle biometric security? Let’s compare a few to see how each stacks […]

Stay away from malicious phone apps that ask to change your launcher

Phone launchers offer more features and functionality people love. However, stay away from malware that represents itself as a legitimate launcher. Your launcher controls virtually everything on your phone, and using a malicious launcher can be a severe security risk, not to mention it’s likely to make your phone unusable. They can also be tricky […]

What’s Bluetooth used for?

Bluetooth is a technology that permits devices to connect with each other without cables or wires. It is an electronics “standard,” which means that producers that want to include this feature must include specific requirements into their electronic devices. These specifications safeguard that the devices can distinguish and interact with other devices that also use […]