34 articles

What is bluejacking? Definition + protection tips

What is bluejacking?


Bluejacking is a Bluetooth attack in which a hacker spams your device with unsolicited phishing messages.

June 19, 2023·3 min
Why is my battery draining so fast? 12 reasons + how to fix it

Why is my battery draining so fast?


Your battery may be draining quickly either from you using a lot of its energy or from settings or issues that can cause your device to burn through its battery life inefficiently.  

December 29, 2022·3 min read
Bluesnarfing: An overview for 2023 + prevention tips

What is bluesnarfing?


Bluesnarfing is a Bluetooth® security threat in which a hacker gains unauthorized access to your files using a Bluetooth connection

November 23, 2022·4 min read
Bluetooth security risks to know (and how to avoid them)

Plenty of devices use Bluetooth. But is it safe? To find out, read this Bluetooth security guide to learn more about its risks and how you can safely use it.

October 02, 2022·3 min read
The risks of rooting your Android phone

Some people talk about the freedom rooting your phone gives you, without stressing the risks. Here’s an overview of the advantages and disadvantages of this process.

September 21, 2022·4 min read
Why does my phone get hot? 13 tips for cooling down your phone

If you have a cell phone, you've probably noticed it's sometimes hot to the touch. There are many reasons why this happens—we’ve put together a guide to why phones get hot and how to protect it.

May 03, 2022·3 min read
Android vs. iOS: Which is better for security?

iOS and Android operating systems and the devices that run them have become targets for malware and viruses. Which is more secure?

March 21, 2022·3 min read
Are digital wallets safe? Here’s what you can do to make them safer

To Accept or Decline? Here are a few reasons it's generally a bad idea to answer a call from an unknown number. Plus, when to make an exception.

September 23, 2021·4 min read
Q&A: Should I answer a call to my smartphone if it’s an Unknown number?

To Accept or Decline? Here are a few reasons it's generally a bad idea to answer a call from an unknown number. Plus, when to make an exception.

September 22, 2021·3 min read
Apple’s AirTag: You might never lose your keys again – but what about your privacy?

A look at how Apple’s AirTags work, the threats they might pose to privacy, and steps you can take to help make sure no one can use them to snoop on you.

August 30, 2021·3 min read
Using payment apps? Here’s how to protect your privacy and avoid scams

Payment apps can make it easy to pay, but there is one downside to using them: You might be sacrificing some of your privacy. Here’s what you need to know.

July 30, 2021·2 min read
Q&A: What should I do about those weird text messages with random letters and numbers?

Garbled texts you receive on your phone are likely spam texts, also known as robotexts. Learn what to do — and what not to do — when you receive spam texts.

July 20, 2021·3 min read
Mobile security threats to your iPhone and Android devices

Mobile devices are part of our lives and hold a wealth of private information. Learn how to protect your mobile privacy and security.

January 14, 2021·2 min read
How to secure your Android phone or tablet

Help protect your Android device by adjusting the security settings for your device and your apps, and more.

January 13, 2021·2 min read
Is jailbreaking legal and safe?

Jailbreaking is the process by which Apple users remove software restrictions imposed on iOS and Apple products like the iPad®, iPhone, iPod®, and more. It lets users install applications, extensions, and other software applications that are not authorized by Apple’s App Store. If something goes wrong with your jailbroken iPhone, Apple says, it’s up to you to fix it.

March 22, 2019·4 min read
3 steps to take immediately if your phone is stolen or lost

3 steps to take immediately if your phone is stolen or lost

August 30, 2018·2 min read
VPN for Android

Browsing on your Android while on the go? Learn how a VPN helps protect your browsing activity on your Android smartphone or tablet, especially while using public Wi-Fi.

August 08, 2018·3 min read
What to do when a device is lost or stolen

Realizing your mobile device has been stolen is a sickening feeling, and often one that elicits panic. As challenging...

August 08, 2018·4 min read
26 iPhone security tips for iOS 13

Learn about Apple iOS 13. Find out tips and tricks to help secure your device, your data, and your password usage.

August 08, 2018·2 min read
Mobile pay is here to stay — and getting better and faster

Mobile payments are getting easier and faster. See what’s new and notable in payment apps, while learning how to make them more secure, too.

August 08, 2018·4 min read
What is mobile ransomware?

Mobile ransomware is a form of malware that steals sensitive data or locks a device and then demands payment before returning the data or unlocking the device.

August 08, 2018·4 min read
Mobile scams: How to identify them and protect yourself

Mobile scams and malware are on the rise, and scammers are evolving to get smarter at tricking you into giving up your data. Review the many different types of mobile scams below and the best ways to identify them and keep your data safe.

August 08, 2018·2 min read
Paying friends through a mobile payment app

Mobile payment apps are changing the way we do business, but they can also be convenient ways to send money to friends and family. Its easier than ever to send money to the people who need it, but...

August 08, 2018·3 min read
8 cyber security tips for business travelers

Whether youre a regular business traveler, or a high-tech adventurer seeker, travelingparticularly abroadposes unique cyber security threats. Business travelers are especially vulnerable because...

August 08, 2018·4 min read
VPN for smartphones

How does a VPN for your smartphone protect your privacy? Learn how using a VPN on your smartphone, especially while using public Wi-Fi networks, can help keep your browsing activity safe and private.

August 08, 2018·3 min read
What is juice jacking? Think twice before using public USB ports

Juice jacking may pose a risk at public USB charging stations. Learn how juice jacking works and how to protect your devices.

August 07, 2018·4 min read
Telltale signs an app is violating your privacy

Malware isn't just for laptops and desktops. In fact, it can be a lot easier for malware to end up on your...

August 07, 2018·3 min read
5 mobile security threats you can protect yourself from

Every year the number of mobile threats keeps increasing. Here are 5 common mobile threats and steps to help protect yourself from them.

August 07, 2018·4 min read
12 iPhone security tips for iOS 12

This year, we welcomed iOS 12. This is a time of great excitement for iPhone users. with all these new enhancements, it’s important to keep in mind that these new features may help or hinder your security and privacy. Here are some tips and tricks to help secure your device, your data, and your password usage.

August 07, 2018·2 min read
The risks of third-party app stores

The main risk you want to avoid is downloading a software application from a third-party app store that infects your smartphone or tablet with malicious software. Such malware could enable someone to take control of your device. It might give hackers access to your contacts, passwords, and financial accounts.

July 17, 2018·2 min read

Want more?

Follow us for all the latest news, tips and updates.