No items in your cart
No items in your cart
Thinking of upgrading to a new mobile device? Make sure you completely wipe all of the information on the old phone or tablet before giving it away or trading it in. This is usually pretty easy to do, as there’s a button within the settings menu of the device that allows for a factory reset.
Your phone likely contains a lot of sensitive data that only you really need to see. For that reason, it’s advisable to avoid lending it to anyone you don’t know”?, particularly if it’s already unlocked. There are a lot of creative stories that people come up with to justify “borrowing” your device in a pinch, […]
What if your SIM card were removed and put into another phone, allowing someone else to receive your calls and messages? You can hedge against this possibility by setting up a SIM PIN on iOS or Android. With that enabled, your SIM isn’t usable unless someone knows its corresponding PIN.
Android is the most popular consumer computing platform in the world, used across billions of phones, tablets, smart TVs and other connected devices. However, its popularity and distinctive structure – under which carriers and manufacturers may heavily modify it – make it a magnet for cyberattacks. As an Android user, what can you do to […]
Internet-based chat apps are generally safer than plain SMS (text) messages, but they’re not necessarily bulletproof. An exploit in WhatsApp, allowing malware injection, showed that even apps touting “end-to-end encryption” sometimes have vulnerabilities. To stay safe, apply any updates as soon as possible or – for particularly sensitive conversations – take them offline or use […]
Tools such as Find My iPhone and Find My Device are useful for locating your phone from a computer if it ever gets lost. If you don’t have one our Mobile Security product has one. Usually, they’re on by default. Note however that you will need a cloud account (like iCloud or a Google Account) […]
We strive to make this policy simple to read and understand. Please read and review the policy here: https://www.totaldefense.com/privacy
Please confirm you have reviewed the policy and provide consent to Total Defense to use your personal data as detailed in our policy.