Hi AppNewser readers - we're now a part of Mediabistro's SocialTimes.com. For more great App news, reviews, guides and tips, head over to InsideMobileApps.

mobile security

Mediabistro Course

Email Marketing

Email MarketingStarting January 12, learn how to create campaigns that engage subscribers, increase awareness, and drive traffic and sales! In this course, you'll learn how to create effective email campaigns to meet your company's goals and objectives, develop copywriting and design techniques, create and manage distribution lists, and more! Register now!

Mobile Ads Displace Porn as Best Source for Mobile Malware

fake avMalware is following us from our computer to our phones – so much so it’s now easier to obtain malicious malware from any mobile ads, even if you’re not using your phone to watch porn.

The findings come from Blue Coat: in February of 2014, 1 in 5 attacks on mobile phones actually came from malicious ads. That’s a 400% increase insect Nov. 2012, compared to porn, which fell to only 16% of all attacks. Read more

4.6 Million Snapchat Accounts Exposed


snapchatHackers gained access to nearly 5 million Snapchat accounts, posting their usernames and phone numbers to the web New Year’s Eve, according to several reports.

The hackers, identified only by the website name — SnapchatDB.info — told the media they were motivated to publish the file of 4.6 million users’ private information as a way to bring attention to known security flaws in the popular app. They also said that they had kept the last two numbers of each phone number hidden. Read more

FaceCrypt Password App Uses Selfies to Secure Your Personal Data

facecryptFacial recognition usually makes us all a bit suspicious, but this new Facecrypt app harnesses that computational power for good. It’s a password management app that allows you to use your face as an added password. For added security, you can also add Liveness Detection to your password keychain to make sure blinking and other facial movements to thwart pirates who may have photos of you.

Like other facial recognition algorithms, the app does not keep a record of your photo - just measurements of it:

FaceCrypt takes measurements of your face and processes them transparently and quickly into a unique data set. On enrolment, the same measurement process happens again and compared against the original enrolled encrypted face. Of course this will not be 100% like for like since facial position, expression and lighting conditions will have differed. Even with variances, FaceCrypt has built in intelligence to still detect if you are the same person and authorised owner of the vault. Read more

Study: Nine in 10 Mobile Apps Possess Security Flaws

phonesecurityMobile apps often ask for personal data to perform their tasks. “This app would like access to your email address, friends’ list, photos, etc., etc.,” right? And we all just click the “OK, sure” button. A recent study from HP, though, suggests app developers need to focus more on keeping that personal information safe.

Nine out of 10 of the more than 2,000 iOS apps HP tested possessed a vulnerability that could represent a security threat. It also found that 97 percent of mobile apps accessed at least one piece of personal information–and 86 percent of those apps did not have proper measures in place to protect your data from “the most common exploits.” Read more

It’s National Cyber Security Awareness Month, Here are Some Security Tips from Intel

NCSAM-10th-Anniversary-Logo-302x86In a startling and ironic introduction to Cyber Security Awareness Month, design software company Adobe admitted its servers were breached by hackers who accessed usernames, passwords, and financial information from nearly 3 million customers. The breach occurred in August, but the company was not aware of the hack until mid-September when security researcher and journalist Brian Krebs noticed  Adobe’s source code on servers used for previous hacking attempts.

In an announcement on the company’s blog on October 3, 2013, Brian Arkin, Adobe’s Chief Security Officer finally explains the extent of the security breach: Read more

Privacy & Data Management On Mobile Devices: INFOGRAPHIC


Backgroundcheck.org has created an infographic called, “Privacy & Data Management on Mobile Devices,” which explores how phones can put you at risk for sharing your personally identifiable information.

We’ve embedded the entire chart after the jump for you to check out. All media professionals should be aware of mobile security.

Here is more from the graphic: “Today, our phones can be a treasure true of not only memories, but personally identifiable information. This puts us at a disadvantage not only if we lose our phone, but when we download certain apps that quietly amass our data. Here’s a look at how Americans manage these data and security issues.” Read more

iPhone Is Tracking It’s Location, What Does It Mean To You?


At the Where 2.0 conference Alasdair Allan and Pete Warden announced they have found that the iPhone and iPad 3G is collecting and storing location information on the device. The collection of the data has been occuring since the release of iOS 4. The information does not appear to be transmitted from the phone, but it is being stored unencrypted and unprotected on the device, although the only way to access the data is via the PC where you back up your iPhone.
Read more

On Device Data Encryption Should Be A Default


For the most part we think of Android as a consumer focused smartphone operating system, but that doesn’t mean that Google doesn’t have aspirations of having corporations using it. In order for Android to get adoption by corporations it needs to be secure and easily managed. Google provides the ability for those who use Google Apps for Business and Google Apps for Education to remotely manage and secure Android phones.
Read more