Security of mobile phones and applications: five popular attack scenarios and methods of protection

Modern mobile devices are multifunctional and complex, which makes them vulnerable to cyberattacks. Attackers have a number of ways into your phone—from Wi-Fi and Bluetooth to the speaker and microphone. Positive Technologies analysts have published a research on the most common scenarios of attacks against mobile devices and applications. For more details, download the research, or read on to get a short overview. Attacks on … Continue reading Security of mobile phones and applications: five popular attack scenarios and methods of protection

Protecting your accounts and passwords: five useful tips

Password security is not in great shape at the moment. According to research, up to 86 percent of all hacked passwords have already been compromised. Reuse of compromised passwords is the reason behind 75 percent of attacks on corporate infrastructure. All too often, users choose easy-to-type combinations (such as “1234567” or “qwerty”). This makes things easy for attackers. Here we will provide some tips on … Continue reading Protecting your accounts and passwords: five useful tips