Quantcast
Channel: Mobile Security – ZoneAlarm Security Blog
Browsing all 81 articles
Browse latest View live

The Impact of Mobile Devices on Information Security

Mobile devices are a cause of concern for organizations. Sensitive corporate information can be transported and lost via iPhones and Androids, and the BYOD movement has increased the number of...

View Article



Summer Travel Security Tips

It’s summertime, which means you are likely making plans for a few short trips, or an extended vacation. While you make your travel plans and make arrangements for your pets and mail, keep the...

View Article

7 Ways to Protect Your Android Device

Android devices seem to be continually under attack, with new reports of malware almost every day. However, the biggest threats against your Android phone or tablet aren’t malware, but rather...

View Article

How to Turn on Two-factor Authentication for Your Email Accounts

Our email accounts contain a ton of information about ourselves. We sign up for bank accounts, buy things online, and communicate with others using our email addresses. And the only thing keeping the...

View Article

What to Do When Your Device is Stolen

Your iPhone or iPad probably has your entire life on it—from photos, apps, contacts, and communications. What would you do if it is ever stolen? There are some preemptive measures you can take to make...

View Article


Protecting Kids Online

With kids accessing the Internet to check their email, to browse the Web and play online games, or just to stay connected with friends and family through chat or social networking services, the risk of...

View Article

Checking-In: Are You Giving Away Too Much Information?

The phenomenon of people using their smartphone or tablet to check-in to places has become extremely popular in the recent years. Location-based social networks such as Foursquare, Twitter, and...

View Article

October is National Bullying Prevention Month: Take a Stand Against Bullying

Bullies come in all shapes and sizes… and forms. We here at ZoneAlarm want to take a stand this October, National Bullying Prevention Month, to bring awareness to the online kind – the cyberbullies....

View Article


Smartphone Theft in the US: Are You an Easy Victim?

Your mobile device is a valuable target to thieves. You never know when one will strike: one minute you’re typing a text, and the next, your smartphone is snatched right out of your hands. We show how...

View Article


How to Turn on Two-step Verification for Your LinkedIn Account

If you’re an employee or someone who is looking for an employer, you likely have a LinkedIn account. Your LinkedIn account not only connects you other employees and employers, but it also contains...

View Article

The Risks of Public Hotspots: How Free WiFi Can Harm You

Practically anywhere you go, you’ll come across public WiFi hotspots. However, this free service could spell trouble. We explore the security risks of public hotspots and what to consider before...

View Article

It’s the Most Wonderful Time… for SEO Poisoning!

‘Tis the time of year for eggnog and holiday tales. Here is a holiday story for you to be mindful of when browsing online. When searching for something on the Web, most people type in a few keywords...

View Article

Security Resolutions for the New Year

Another new year means new resolutions! And while we’re not going to push you to exercise more, we do want to encourage you to be more secure when you’re online. So to start 2014 on the right note,...

View Article


Why You Should Take Your Passwords Seriously

Unfamiliar messages. Passwords that no longer work. These are just two of the many clues that cybercriminals have gotten a hold of your password and broken into your account. With the password...

View Article

HTTPS: The S is More Than Just a Letter

Anyone who has ever used the Internet has looked up at their browser’s address bar and noticed a series of letters that either looks like this ‘HTTP’, or like this ‘HTTPS’. At first glance, it may seem...

View Article


Five Myths About Malware You Need to Know

Malware is everywhere. You can get infected by opening up a rigged attachment in your email, or by visiting a booby-trapped website that automatically downloads malware on to your computer. Once...

View Article

The Man-In-The-Browser: It Hungers For Your Online Credentials

Imagine you’re trying to log into your online banking account. Rather than being directed to the page you’ve requested after entering in your User ID and password, an additional field appears and asks...

View Article


Weak Passwords: Are You Making It Too Easy For Criminals?

The password to your online account is like the key to your front door. How strong are your passwords? We’ll address some troubling facts about weak passwords and what you can do to make them stronger....

View Article

What You Need To Know About Peer-to-Peer File Sharing

BitTorrent. uTorrent. The Pirate Bay. These are just a few of the many popular peer-to-peer (P2P) file sharing sites you’ve probably heard of. Since its increase in popularity in the late 1990s, P2P...

View Article

Are You Making Yourself a Victim of Cybercrime?

Did you know some things you do on the Web could actually be putting your PC and personal information in jeopardy? Here are some mistakes and misconceptions that could make you a victim of cybercrime,...

View Article
Browsing all 81 articles
Browse latest View live




Latest Images