Security. Privacy. Shopping. Travel. |

Travel And Technology: What I Can’t Live Without

Wondering what to take on the road when it comes to electronics?  You’re not the only one.  Long gone are the days where a basic camera and some binoculars were the height of travel gadgetry.  Walking into a hotel now requires a quick scan for the nearest plug (or plugs), the first thing I do is make sure everything is charged and ready to go. So what does a long term traveler have in her carry-on? I am giving you a glimpse into the things I am obsessed with having. That is not to say that I don’t have more […]

The Rise Of Mobile

Do you remember those clunky 2 pound mobile brick behemoths from the 80’s that featured walkie-talkie antennas? We’ve come a long way in mobile technology since then. Today we have mobile phones that are sleek, streamlined, and can easily disappear into your pocket.

According to The International Telecommunication Union, at the end of 2012 there was 6.8 billion mobile cell subscriptions worldwide (equivalent to 96 percent of the world population). In the US, 25 percent of Internet users are mobile only. On average: people check their smartphones 150 times a day and 44 percent bring their phones to bed, (or have them nearby), […]

By |September 26th, 2013|Mobile|0 Comments

Top Mobile Security Apps For The Back To School Crowd

August is the last month of summer and also the beginning of the homestretch for back-to-school planning. It’s also time to seriously start thinking about securing your smartphone and to vet the apps that are already on your phone.  Selecting top mobile security apps for your device should be at the top of your to do list. 

Security researchers believe  that a serious vulnerability known as the master key flaw, could be present in 99% of Android devices. This flaw has the capability to allow an attacker to hijack any legitimate app without modifying its digital signature.
San Francisco-based Bluebox Security discovered the Android […]

Android Devices Vulnerable To More Malware Attacks

By |February 28th, 2013|Mobile|0 Comments

Privacy dangers lurk in ubiquitous data-gathering mobile apps


While looking through my iPhone apps this morning, I found it disturbing that I really do not know what data all these mobile apps on my phone are collecting. We should not have to browse to a mobile app site to read their privacy policies – only to find out that we have limited choices, if any at all (if we want to use their software), in restricting the personal data that they collect.
What is going on, according to experts, is that applications like Angry Birds and even more innocuous-seeming software, like that which turns your phone into a […]

Are Your Children Playing Junk Food Mobile App Games?


The Wall Street Journal recently reported that U.S. food companies are reaching children by embedding their products in mobile game apps. I downloaded a few games this morning and was not impressed.

It is too easy for a child to click a mobile ad; the “x”(to close the ad)  is minimal, while the ad itself is splashed across the screen. If you were a young child, would you click on the small x or the over-sized graphic?

My App Review: The SuperPretzel Factory by Sunstorm Interactive may be entertaining for a young child – the child presses different mixer buttons as she/he attempts to fill […]

By |September 26th, 2012|Mobile|0 Comments

What are mobile apps doing behind our backs?

The typical user has very little control over security and privacy settings of mobile devices. Many users are drawn to jailbreaking their devices so that they can manipulate tightly restricted and locked-down mobile operating systems. This comes at the cost of voiding device warranties.
One US company, Flurry Analytics, tracks 1.4 billion app sessions a day from more than 600 million smartphones and tablets. It offers more than 70,000 companies the chance to ”identify your best segments by demographics, interest, geography, usage and more”.
US-based researcher and consultant Ashkan Soltani said people are most valuable to advertisers when they have a […]

By |September 18th, 2012|Mobile|0 Comments

10 Ways To Beef Up iPhone Security

I’m a coffee shop connoisseur; the most frequent mistake I see with fellow java-lovers is the ease with which they leave their iPhones or iPads lying on the table when they go to retrieve their order. My iPhone is like a third hand when I am in public space; I never let it out of my sight.

When I am in the city (or a high crime rate area), all my devices are carefully concealed. I never give criminals an open invitation to mug me. My Jeep never announces that any semblance of technology exists within.

The lucrative secondhand market for […]

By |September 14th, 2012|Mobile|0 Comments

Mobile Malware

Mobile device malware threatsis getting ugly…Storified by Get Cocoon · Tue, Aug 07 2012 11:25:44Malware FundamentalskasperskyMorcut can record Skype sessions, log instant messages sent from Microsoft Messenger and Adium, as well as track browser usage in Mozilla Firefox and Safari. New Mac Malware Hits the Scene #malware #MacGet CocoonThere is a new version of Android malware dubbed “OpFake” that will send SMS text messages to premium numbers and is integrated with a copy of Opera’s Mini browser.OpFake, FakeInst Android Malware Variants Continue to Resist Detection | threatpostAndroid devices have remained […]

By |August 7th, 2012|Mobile|0 Comments

Mobile malware is on the rise

Malware is no longer a threat that is exclusive to desktop operating systems. The RSA 2012 CYBERCRIME TRENDS REPORT white paper stated that 2011 marked the year of new advanced threats on a global basis. In 2012, cybercriminals are finding new and innovative ways to monetize non-financial data, while hacktivism is on the rise. They predict that “InfoStealers” for the mobile platform will emerge with Trojans that are designed to “keylog touch-screen input and monitor data traffic through the mobile device.”

The RSA Anti-Fraud Command Center (AFCC) reports that Zeus is responsible for 80% of all attacks against financial institutions and […]

By |July 31st, 2012|Mobile|0 Comments