Politically-Inclined Mobile Users Warned to Guard Privacy

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Previous Next

Click through for more on the personal data and permissions required for presidential campaign apps and the top 10 threats for August, 2012, as identified by GFI Software.

GFI Software™ recently released its VIPRE® Report for August 2012, a collection of the 10 most prevalent threat detections encountered last month. In August, GFI threat researchers also examined the privacy of users downloading mobile apps released by both the Barack Obama and Mitt Romney U.S. presidential campaigns. Researchers also uncovered a variety of new attacks targeted at Android™ device owners including phony antivirus programs and a fake Adobe® Flash® Player application.

“While issues with mobile security are a relatively new phenomenon, it does not mean that there are not already a large number of security pitfalls that users should avoid,” said Christopher Boyd, senior threat researcher at GFI Software. “Avoiding mobile malware often requires the same preventative tactics associated with traditional malware such as verifying the legitimacy of any unsolicited emails or hyperlinks before installing an unknown application or submitting personal information. However, as we saw this month, even legitimate mobile applications can pose a threat to privacy if users do not investigate before granting permissions to gather data.”

 

Related Topics : Box.net, Laptops

 
More Slideshows

Wearables2-290x195 Five Tips to Ensure Apps Are Watch Worthy

Organizations must now also take Apple Watch connectivity into account when planning their mobile engagement strategy and ensure their apps are Watch ready. ...  More >>

mobile58-190x128 Five Tips for Closing the Enterprise Mobility Gap

Without the right infrastructure, the essential business of app development ends up taking more time, money and resources, leaving businesses behind the eight ball. ...  More >>

EMCSyncplicityEnterpriseAppsUX0x Preventing Shadow IT: Tips for Designing Better Enterprise Apps

If users are dissatisfied with their UX, they often will migrate to less secure "shadow IT" service, which puts an entire company at risk of security incidents. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date