Blog

Get Smart─Lock Down Your Apps

by Robert Siciliano

MobileApplications

Apps are what make smartphones smart. Without apps, smartphones would just be regular feature phones. Apps are what make our smartphones into our most personal computers. And like our computers, we need to protect our smartphones and apps.

Some of the most commonly used apps on the Android platform such as Facebook, LinkedIn and Gmail don’t require a log in each time they’re launched, which is convenient, but from a security standpoint, not smart. … Continue Reading

Keeping your Information Safe on an Android Device

by ITRC

AndroidPhone

Most of us who own smart phones store a considerable amount of personal data on them which could be very damaging if the phone was lost or stolen. Everything from valuable documents, passwords, personal pictures, banking or credit information, and personal text messages could be compromised. Fortunately, there are several steps one can take to protect the data stored on their phone. What follows are some best practices for protecting the data on your Android Smart phone. … Continue Reading

What’s on Your Phone? A Lot More Than You Realize!

by Robert Siciliano

MobileApplications

It’s funny to me that when having conversations about technology people still don’t see the parallel between their smartphone and their computer.

Today, smartphone are connected to the Internet and have much of the same information as the personal computer, if not more. Now Androids and other smartphones have become little mini handheld computers. Carriers are announcing that they’ll be upping the speed of the latest version of their networks, doubling download speeds. … Continue Reading

Mobile Malware is Here: Beware!

by Robert Siciliano

MobileApplications

iPhones, Androids and other smartphones are much more than just a way to call our friends and family and store their phone numbers. Today’s smartphones have become our most personal computer and contain much more than pictures and contacts. They now allow us to access financial data, bank accounts, and medical information from anywhere at any time. … Continue Reading

Smartphone Users Should be Aware of Malware Targeting Mobile Devices and Safety Measures to Help Avoid Compromise

by FBI IC3

AndroidPhone

The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. … Continue Reading

← Older Posts

More from our blog

Sad Girl on Computer
Were You Unwittingly in the “Zombie” Army that Attacked the Internet?

The powerful attack on the Internet last week raised many questions — who did it? how did it happen? and could it happen again? Some of those answers are still unknown and could be for awhile. But what is known is that the Internet attack involved millions and millions of computers around the world. And we’re learning that not all of the computers involved are those of companies — some of the computers used, as well as other devices, are ones in people’s homes.

Nicole Perlroth outlined these disturbing facts in a recent New York Times article (see, “Devices Like Cable Boxes Figured in Internet Attack”; page B1, March 30th). … Continue Reading

Red triangular other dangers warning sign on white
FRAUD ALERT: Fake Employment Agency Fools Job Hunters with Scam Calls

The BBB is dedicated to fostering honest and responsive relationships between businesses and consumers in the U.S. and Canada, instilling consumer confidence and contributing to a trustworthy marketplace for all. … Continue Reading

computer-stethoscope.jpg
Prevention vs. Cure: Facing the Worst-Case Scenario

There’s an old saying: “There’s no such thing as bad PR.” Well, it’s not true, at least where healthcare is concerned. While starlets and bloggers may thrive on scandal and controversy, consumers look to their healthcare providers for reliable, quality care and privacy. … Continue Reading

Privacy Policy

FraudAvengers.org appreciates your readership and values your personal privacy.

We respect all personal information you provide on our site and acknowledge the importance of protecting this information.

Continue Reading