Archives - Mobile Security


More devices, more vulnerabilities – What 5G networks mean for mobile and IoT security

By now, you might have heard or read something about 5G mobile networks. As the name suggests, 5G denotes the fifth generation of cellular data and voice technology. Each generation so far has represented a significant technological advancement: 1G pioneered truly wireless calling as well as roaming. 2G introduced digital call encryption and SMS (text […]

Keep a VPN app installed on your phone

Virtual private networks, which may be free or paid services, are the best way to ensure a secure network connection. If you’re on the go, you will usually have pretty good protection by using cellular service on your phone, tablet or laptop, but a VPN is useful in situations where you want to fully protect […]

Set up security code change notifications in WhatsApp

Every WhatsApp conversation has its own security code to indicate that the exchange is encrypted end-to-end. It is presented as both a 60-digit code and a QR code. Sometimes, the code will change, such as when someone switches devices or reinstalled the app. You can turn on notifications about these changes within WhatsApp settings so […]

Screen calls to your mobile device

If you’re overwhelmed by the volume of risky calls to your number, one measure worth considering is call screening. This functionality is available through some third-party services and is built into many Android devices via the Phone and Google Assistant apps. It will force each caller to work through a prompt before being allowed to […]

Do not engage with unfamiliar callers

Scam phone calls have seen a major resurgence despite regulations such as the National Do Not Call List. The best practice here is also the simplest: Don’t answer calls from unfamiliar numbers. Set up a voicemail inbox with a descriptive prompt so that legitimate callers can get in touch. Scam callers will often not leave […]

How to combat robocall scams

Remember the National Do Not Call Registry? This database, authorized by the federal  Implementation Act of 2003, contains a list of phone numbers of individuals and families who have indicated that they do not want telemarketers to contact them. At the time of its creation, it was widely heralded as a big step forward for […]