Fake Charging Stations Can Hack Your Smartphone

Is the Juice Worth the Squeeze? 

Nobody wants to run out of battery power while they’re out and about. In fact, a recent study found that we check our phones at least 80 times a day. This attitude has become prevalent in today’s connected world simply because we use our mobile devices for more than just making calls. 

In a world where we rely on our phones for virtually everything – from online banking and email accounts, to social media, games and more – public charging stations can be the ultimate lifesavers when your battery is running low. 

But security experts warn that the juice is never worth the squeeze if a charging station is rigged to steal your data.  Continue reading

Connected Vehicles Raise Cybersecurity Concerns

Connected Vehicles & Cybersecurity

Connecting vehicles to the Internet is no longer a far-fetched, futuristic idea. Once seen as an exclusively luxury item, most mainstream car brands now offer vehicle models with connected technology and other autonomous driving features. 

Connected vehicles offer a number of personalized features that once seemed too high-tech to be possible. From Tesla to Toyota, Internet-enabled vehicles have quickly become a popular commodity, particularly amongst Millennial drivers. In fact, experts predict that most, if not all, vehicles will be connected to the Internet by 2035. 
Continue reading

Pro V. Con: BYOD Security Challenges & Concerns

Employees and Personal Devices 

Most employees will bring at least one type of smart device – most likely a smartphone – into the office. In fact, 77 percent of Americans use smartphones, which is why business owners have begun putting Bring Your Own Device, or “BYOD” policies in place.  

BYOD simply means that your business allows employees to bring their personal devices, like laptops and mobile devices, into the workplace. These policies vary depending on your business type, the type of information you store, your employees’ access to that sensitive information and your company’s size and budget. 

No matter what type of business you run, it’s important to consider your company’s BYOD security challenges despite the added benefits to productivity and your bottom line. Join us as we discuss BYOD, how to choose the right program for your business, and ways to improve existing BYOD programs you already have in place.  Continue reading

Stay Smart About Fake Smartphone Apps

Fraudsters go mobile 

Our smartphones send, receive and store tons of sensitive information about us. This includes the information-rich apps we have on our devices. 

With over 6 million apps to choose from across Apple, BlackBerry, Amazon, Android and Windows, a smartphone can virtually perform any function and can hold as much (or more) data as a full-sized computer. 

Of course, criminals will do what it takes to get that data. 

Fraudsters are taking advantage of the fact that many have shifted to mobile services, specifically mobile banking. If you’re like 77 percent of the U.S., you probably own a smartphone and use a number of apps available for your device.

Let’s explore why criminals are turning to fake smartphone apps, how they can exploit those apps to commit identity crimes, and ways to help you safeguard your personal information from these identity crime schemes.

Continue reading