Three Mobile Security threats That You Must Take Seriously In 2018

When the deadly strain of ransomware was released in May of 2017, the attack shocked even big multinationals. A few months after a deadly strain of smartphone ransomware started targeting individual phone users threatening to encrypt their info and selling it on the black market. As mobile phones become part and parcel of daily work, the emerging threats could pose a huge threat at the enterprise level. Almost every employee remotely accesses company info from the mobile phone. This means that a lot of sensitive information can easily fall into the wrong hands through indirect attacks. Here are the top mobile security threats you need to know about and prevent at all cost. Data leakage Mobile data leakage is the most serious threats to your business. But what makes the issue worrying is that it is not reprehensible. Rather, it arises from the smartphone users making wrong decisions about the apps allowed to see the info. Whether it is the company management system or strategic planning secrets, your information is no doubt at great risk of leaking into the wrong hands. The challenge with this threat is how to apply an app vetting procedure without overwhelming the admin and frustrating the phone users. Consider using advanced solutions such as Zimperium’s zIPS Protection and Symantec’s Endpoint Protection Mobile that help to scan installed apps for leaky behaviour. You should also consider using Data Loss Prevention tools that help prevent accidental exposure of sensitive data accidentally. Social engineering It is estimated that over 90% of data breaches occur as a result of phishing (Data Breach Investigations Report). While some tactics applied...

Reasons Google Killed Off the Nexus Line

When Google unveiled the Pixel line, they managed to wow the tech world with the Pixel phone’s superb features and capabilities. In fact, the phone was quickly ranked among the top phones in the market. Almost everybody wanted to get their hands on it especially due to its state of the art camera. However, the Pixel’s launch also left a myriad of potent questions unanswered like what happened to Nexus?  This question wasn’t left unanswered for a long time though. No sooner had Google released the Pixel, than they said they had abandoned the Nexus line. The question then became why? Why did they ditch Nexus which targeted developers mainly for Pixel which is packaged for the premium market? Name The first reason was right under your nose and you didn’t even notice it. The name Nexus means the coming together of two things. In Google’s case it is teaming up with another electronic company to create a suave phone. Instances of this include when it collaborated with Samsung, LG, Moto and Huawei to create the Nexus One and Galaxy Nexus; Nexus 4, 5 and 5x; Nexus 6 and Nexus 6P respectively. These collaborations saw Google stick to the software aspect of the device while its partners to the hardware. However with the unveiling of Pixel, which was 100% developed by Google, ditching the name felt right. Artificial Intelligence As Google developed a stronger inclination towards AI, it sought a platform where it could explore its ideas unshielded. In a world which Google viewed as shifting from mobile first to AI first, they didn’t want to lag behind. This...

4 Most Effective Methods of Keeping Your Smartphone Free From Cyber Criminals

One of the most disturbing things in the world of smartphones today is the risk of attack by cybercriminals. Smartphones are advanced computing devices that are used to store and carry sensitive personal info such as business documents, bank passwords, and financial history. Unlike in the past when cybercriminals mainly targeted your desktops unworkable, it is different today. Cybercriminals want to lock your phone data or steal it to siphon credit cards balance. The most stressful cyber-attacks are perhaps from the latest strains of ransomware such as DataLust that targets stealing smartphone data and selling it on the black market if you fail to pay a ransom. Notably, the cybercriminals are advancing as fast as smartphone technologies. Is there a way you can keep yourself and the smartphone free from cyber attacks? Here are some 4 tips you should employ to remain secure all the time. Start by picking phones made by a company that works tirelessly to keep users safe The security of your smartphone and data stores in it starts with the type of phone you pick. Well, this is a battle that you cannot win alone. Top companies such as Apple take a lot of time vetting all associated apps during processing and deployment. In fact, before releasing any version of associated apps, the company tests it in multiple scenarios and even releases a Beta version to evaluate vulnerabilities. Therefore, associated phones such as iPhone 7 have been remarkably secure. Another company that stops at nothing in ensuring that all its phones and associated apps are extra secure is Google. Though it uses Android that has...

The Most Important Things to Know about the Face ID IN iPhone 8 and X

Many people who are out looking for new smartphones are faced with an uphill task of selecting between the latest releases by Samsung and Apple. In fact, Google has even added to the matrix with the latest pixel 2 XL. However, iPhone X remains the most preferred because of its unique features such as Sire, animoji, and wireless charging system. But the most remarkable is the facial ID. Unlike the previous iPhone models, iPhone 8 and X users will only need to look at their phones to unlock. This system is more secure, reliable, and indeed fun. Even with these advancements, some questions have started emerging about the Face ID. If you are planning to purchase iPhone 8 or X, here are some things to know about its facial ID. Does Apple collect user’s visual IDs? This is one concern that many people using different smartphone apps keep asking. Some have been arguing that with the new Face ID System, Apple gathers and stores the iPhone users’ ids in its database. Well, this is not true. Once you buy an iPhone x or iPhone 8, the Face ID System works just like the finger scanner. The facial info is scanned and stored in a mathematical representation on the Secure Enclave (a section of the processor). The facial details are also encrypted so that no third party can access them. When someone looks at the phone, the Face ID system scans the face and compares to what is stored in the Secure Enclave. Other apps you use on the phone cannot directly access the login info. The only time Apple...

What to expect from iOS 11

It comes as no surprise that people were eagerly awaiting the iOS 11. There is so much to love in the new iOS 11.  It is clear that all the hype surrounding it was justified as it is bound to blow everyone away. Its fresh new features and better design make it a definite must-have. Design Changes You can expect a few UI changes in the iOS 11. Nothing too drastic just some subtle changes but still enough to delight. The changes include bolder texts and icons without borders in some apps. This is a drastic shift away from the texts and icons that have graced the iOS since iOS 7. Control Centre The Control centre has been redefined to a single consolidated look with bubbly icons. Furthermore, it now occupies the entire screen unlike in the iOS 10 where it occupied only half of the screen. It has also been made more customizable, offering an array of icons that you can add to it. You are also now given a 3D touch option which gives you more control over an app. Lock Screen The lock screen has also been revamped and merged with the lock screen. Now when you swipe down for notifications, you will meet the lock screen. On it will be all your notifications, to get back to your home screen you will be mandated to swipe twice up the screen. However, there is no need to worry about your widgets contained in today. They are still available with a swipe to your right on either your home screen or lock screen.   Siri Another feature...