Articles relating to 'security'

App Spotlight: Zemana Mobile Antivirus

This article is posted in Mobile App Spotlight

Recently we had an opportunity to speak with Amina Zilic , the R&D Engineer at Zemana Ltd about Zemana Mobile AntivirusPlease share with us the backstory of what motivated you to create this app.As mobile devices become increasingly popular, many people stopped touching their computers. Mobile security became a major issue but public awareness about mobile threats didn't increase in the same extent.A malware can know where you are by accessing GPS, can listen your environment by using microphone...
Read entire article

App Spotlight: Pryvate

This article is posted in Mobile App Spotlight

Recently we had an opportunity to speak with Jonathan Parker-Bray , the CEO & Founder at Cryptique about Pryvate Please share with us the backstory of what motivated you to create this app.Throughout my career I've been fascinated by the latest trends in the mobile, telecoms and technology industries. The motivation behind Pryvate was the sharp rise in data hacking, theft and surveillance. We pinpointed the trend in encryption technology and the critical need for business and personal communica...
Read entire article

App Spotlight: Intel® Security Battery Optimizer

This article is posted in Mobile App Spotlight

Recently we had an opportunity to speak with Steven Lin, the Product Marketing Manager at Intel Corporation about Intel® Security Battery Optimizer Please share with us the backstory of what motivated you to create this app.In 2015, Intel® Security (formerly McAfee) announced a campaign “Life beyond Security" and began exploring the opportunity to expand its product offering beyond antivirus and anti-theft security and protection. It is common knowledge that mobile users are increasingly relying on...
Read entire article

How digital mobile wallet apps have taken over as a primary payment method

This article is posted in Technology

The recent advancements in online shopping have transformed the way the companies approach the payments. They are aimed at making the process of payment seamless, which should be fraught with foolproof security. The users are often reluctant to share their credit card details with the online shopping websites or service provider for payment. Those who have been the victim of the phishing attack on their cards are even more wary of using credit and debit cards for online transactions. Mobile or digital wa...
Read entire article

Top 5 reasons why most mobile apps fail

This article is posted in Mobile App Development

Over half of all mobile apps on the market today will have to be completely replaced or rewritten in the next two years. This scary statistic highlights that there is a very complex, resource-rich and problemsome process involved in making a mobile app successful. After hearing stories from hundreds of mobile app developers, here are the top five reasons why most mobile apps fail as a business.Problem 1: making a complicated mobile appBusiness websites and webapps work in a common fashion - users log in, na...
Read entire article

The most secure smartphone yet - Tor-infused BOSS

This article is posted in Technology

This is the smart device era. Internet and use of smart devices and phablets have become a household activity. We cannot even think of living without the smart phone technology these days. Over the years the technology has advanced a lot. Every month rather every week brings about new features and upgrades for the smart phone users.Among the few things that are in discussion in the smart phone industry these days is the security of personal data and information when you are on the move. Many technology comp...
Read entire article