Mobile

40 articles

How to block websites on iPhone: 5 different ways
Block websites on your iPhone using different methods, including Screen Time settings. Find out how here.
Published: November 22, 2024 ·6 min read
Why does my phone get hot? 7 tips to avoid overheating
Why does my phone get hot? Phone overheating is often the result of overworking the battery or processor.
Updated: August 28, 2024 ·9 min read
How to turn off a VPN on an iPhone (3 simple options)
Safely disconnect your VPN on iPhone using our easy-to-follow instructions and learn about some of the common reasons you might need to disable your VPN.
Published: August 14, 2024 ·6 min read
Android vs iPhone security: which is safer?
Discover the differences in Android vs iPhone security. Learn which devices and operating systems are safest and most secure before you buy.
Updated: June 28, 2024 ·9 min read
Can iPhones get hacked? Yes, and 8 ways to fix it
Learn how iPhones can get hacked, signs to know if your iPhone’s been hacked, and how to fix the issue.
Published: June 28, 2024 ·14 min read
How to use a VPN on an iPhone or iPad in 2024
Learn how to use a VPN on an iPhone and iPad. Discover what a VPN is and how to get one on iOS devices.
Published: June 26, 2024 ·11 min read
Why is my phone so slow? 7 reasons (+ tips to speed it up)
Discover why your phone is running slowly and find solutions to speed up your device. Learn about common issues and how to fix them in this guide.
Published: May 22, 2024 ·9 min read
Scammers phishing for information use complex AI tools—you should too
Messages that lure us into revealing personal information to scammers are getting harder to detect, thanks to AI. Genie uses AI to fight back.
Published: February 15, 2024 ·6 min read
Mobile security: What it is and why you need it
Mobile security is the strategy and software that protects mobile devices like phones, tablets, and laptops from hackers, malware, and identity theft.
Updated: January 16, 2024 ·12 min read
What is a third-party app? Examples and potential risks
Third-party apps are apps that you can download onto your smart devices from an app store that wasn’t developed or supported by the operating system maker.
Published: November 13, 2023 ·6 min
How do I get rid of pop-up ads on my phone?
Pop-up ads and alerts are disruptive, and they can be a security risk too. Learn how to get rid of pop-ups on Android and iPhone.
Published: July 20, 2023 ·3 min
What is a VPN on iPhone? A complete set up guide
An iPhone VPN encrypts your internet connection to protect your online privacy. Learn what a VPN on an iPhone is and how to set one up.
Published: June 29, 2023 ·3 min
SMS spoofing: An overview + 5 SMS spoofing types to avoid
Mobile scams like SMS spoofing pose a real threat. Learn what a spoofed text is and how to stay safe so you can avoid becoming a victim.
Published: June 28, 2023 ·3 min
What is bluejacking? Definition + protection tips
If you use Bluetooth, you may be at risk of bluejacking. Follow this guide to learn more about bluejacking, how to spot it, and how to stay safe.
Published: June 19, 2023 ·3 min
What is SIM swapping? SIM swap fraud explained and how to help protect yourself
SIM swap fraud occurs when scammers take advantage of a weakness in two-factor authentication and verification and use your phone number to access your accounts.
Published: June 14, 2023 ·3 min read
Why is my battery draining so fast? 12 reasons + how to fix it
If you've wondered, "Why is my battery draining so fast?" then you know a dying battery can be a pain. Read along to learn about the causes and how to fix them.
Published: December 30, 2022 ·3 min read
Bluesnarfing: An overview + prevention tips
Bluesnarfing attacks can put your files and Bluetooth devices in jeopardy. Follow this guide to learn more about bluesnarfing and how you can help prevent an attack.
Published: November 23, 2022 ·4 min read
Bluetooth security risks to know (and how to avoid them)
Plenty of devices use Bluetooth. But is it safe? To find out, read this Bluetooth security guide to learn more about its risks and how you can safely use it.
Published: October 02, 2022 ·3 min read
The risks of rooting your Android phone
Some people talk about the freedom rooting your phone gives you, without stressing the risks. Here’s an overview of the advantages and disadvantages of this process.
Published: September 21, 2022 ·4 min read
Are digital wallets safe? Here’s what you can do to make them safer
Digital wallets are convenient, but are they safe? Learn how you can better protect your credit card and bank account information while using them.
Published: September 23, 2021 ·4 min read
Q&A: Should I answer a call to my smartphone if it’s an Unknown number?
To Accept or Decline? Here are a few reasons it's generally a bad idea to answer a call from an unknown number. Plus, when to make an exception.
Published: September 23, 2021 ·3 min read
Apple’s AirTag: You might never lose your keys again – but what about your privacy?
A look at how Apple’s AirTags work, the threats they might pose to privacy, and steps you can take to help make sure no one can use them to snoop on you.
Published: August 30, 2021 ·3 min read
Using payment apps? Here’s how to protect your privacy and avoid scams
Payment apps can make it easy to pay, but there is one downside to using them: You might be sacrificing some of your privacy. Here’s what you need to know.
Published: July 29, 2021 ·2 min read
Q&A: What should I do about those weird text messages with random letters and numbers?
Garbled texts you receive on your phone are likely spam texts, also known as robotexts. Learn what to do — and what not to do — when you receive spam texts.
Published: July 20, 2021 ·3 min read
How to secure your Android phone or tablet
Help protect your Android device by adjusting the security settings for your device and your apps, and more.
Published: January 14, 2021 ·2 min read
Is jailbreaking legal and safe?
Jailbreaking is the process by which Apple users remove software restrictions imposed on iOS and Apple products like the iPad®, iPhone, iPod®, and more. It lets users install applications, extensions, and other software applications that are not authorized by Apple’s App Store. If something goes wrong with your jailbroken iPhone, Apple says, it’s up to you to fix it.
Published: March 22, 2019 ·4 min read
3 steps to take immediately if your phone is stolen or lost
3 steps to take immediately if your phone is stolen or lost
Published: August 31, 2018 ·2 min read
Mobile scams: How to identify them and protect yourself
Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.
Published: August 08, 2018 ·2 min read
Paying friends through a mobile payment app
Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. Its easier than ever to send money to the people who need it, but...
Published: August 08, 2018 ·3 min read
What to do when a device is lost or stolen
Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...
Published: August 08, 2018 ·4 min read
Telltale signs an app is violating your privacy
Malware isn't just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your...
Published: August 08, 2018 ·3 min read
26 iPhone security tips for iOS 13
Learn about Apple iOS 13. Find out tips and tricks to help secure your device, your data, and your password usage.
Published: August 08, 2018 ·2 min read
What is mobile ransomware?
Mobile ransomware is a form of malware that steals sensitive data or locks a device and then demands payment before returning the data or unlocking the device.
Published: August 08, 2018 ·4 min read
8 cyber security tips for business travelers
Whether youre a regular business traveler, or a high-tech adventurer seeker, travelingparticularly abroadposes unique cyber security threats. Business travelers are especially vulnerable because...
Published: August 08, 2018 ·4 min read
5 mobile security threats you can protect yourself from
Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.
Published: August 08, 2018 ·4 min read
What is juice jacking? Think twice before using public USB ports
Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.
Published: August 07, 2018 ·4 min read
Mobile pay is here to stay — and getting better and faster
Mobile payments are getting easier and faster. See what’s new and notable in payment apps, while learning how to make them more secure, too.
Published: August 07, 2018 ·4 min read
VPN for smartphones
How does a VPN for your smartphone protect your privacy? Learn how using a VPN on your smartphone, especially while using public Wi-Fi networks, can help keep your browsing activity safe and private.
Published: August 07, 2018 ·3 min read
12 iPhone security tips for iOS 12
This year, we welcomed iOS 12. This is a time of great excitement for iPhone users. with all these new enhancements, it’s important to keep in mind that these new features may help or hinder your security and privacy. Here are some tips and tricks to help secure your device, your data, and your password usage.
Published: August 07, 2018 ·2 min read
The risks of third-party app stores
The main risk you want to avoid is downloading a software application from a third-party app store that infects your smartphone or tablet with malicious software. Such malware could enable someone to take control of your device. It might give hackers access to your contacts, passwords, and financial accounts.
Published: July 17, 2018 ·2 min read

Want more?

Follow us for all the latest news, tips and updates.