How big is the issue? This is an impossible question to answer, but one thing is clear: hardware manufacturers (and carriers) should be encouraged to ensure they deliver these critical security updates in a timely fashion.
There are a few ways that we can acquire malware on our devices. Websites can push or install an application or we can consciously install an application. It’s also possible to have an application sent to our device via
A public hotspot’s name may be spoofed by somebody with malicious intent. Ever been to a coffee shop chain and your device hasn’t connected, but when you looked in the WiFi settings you saw what looked like the right network?
On August 2nd Google officially announced the release of the Android Device Manager. This online interface allows users to locate their device and remotely cause the phone to ring or erase all its data.
Recent media attention has spread more attention specifically around the posting of pictures online. With a few browser plugins anyone (without or without hacking skills) can find the exact location where many online pictures were taken.
Lets face it, I have lived in fear. I was always scared that my computer would crash or be stolen and I would lose all of my files, settings, and personal data. I’ve been evaluating various backup options that available and recently I found one that caught my eye.
The “missing device” function is the primary reason to use this app. It is very easy to login to the online application at mylookout.com and track the phone. It first streams the GPRS location based on the cell phone towers and then after a few more seconds brings in the actual GPS location. This process seemed more