Mobile app makers can now use uninstall tracking software to inundate ex-users with advertising designed to win them back. Can app developers continue to use customer data for any purpose which fits their business model – even after users have deleted the mobile app?
SIM swap scams are increasingly profitable for criminals with the growing dependence on phone-based authentication and mobile wallets storing cryptocurrencies. Are mobile carriers doing enough to prevent SIM swap fraud?
Secure messaging apps can provide a great means of communicating securely and privately, but there's a privacy dilemma as law enforcement and national security agencies face significant obstacles to the lawful access of communications.
Mobile applications collect a lot of personal data. What are the GDPR considerations for mobile app businesses when laying out the concept and execution of their application?
Latest variant of Fakebank Android malware adds even more functional threats to banking clients – in the form of ‘vishing’ (voice phishing). It can now intercept outgoing and incoming calls which is then redirected to scammers which allows them to pose as legitimate employees of the bank.
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks.
Social fitness apps such as Strava need to be doing more to enhance user privacy and safety. The recent snafu involving the disclosure of U.S. military personnel location data has increased awareness of the perils created by tracking apps. Learn more about how these apps are collecting data, and how they are using it.
With the Play Store distributing malicious apps like fake WhatsApp and malware, is downloading only from trusted Android stores still a relevant approach?
Indian government subjects phone makers to cyber security standards and are required to report their hardware, software and network security measures by August 28th.