Previously Undisclosed Flaw Let Hackers Hijack Millions of Systems Through Innocent-Looking Files Post date January 28, 2025 Post author By Fikri Azhar Post categories In android-security, cve-2018-1002201, cybersecurity, hackernoon-top-story, mobile-security, pentesting, remote-code-execution, zip-slip
7 Unspoken Rules of BYOD Security in the Workplace Post date October 28, 2024 Post author By Nadia Bonini Post categories In bring-your-own-device, byod, cybersecurity, endpoint-security, how-to-write-a-byod-policy, mobile-device-management, mobile-phone-security, mobile-security
Keep Trackers and Advertisers at Bay with these Browser Privacy Tips Post date September 22, 2021 Post author By Zen Chan Post categories In brave-browser, browser-privacy-tips, browsers, chrome, cybersecurity, Firefox, keep-trackers-at-bay, mobile-security, web-monetization
Understanding Pegasus: How to Trace the Untraceable Post date September 22, 2021 Post author By Zen Chan Post categories In cybersecurity, cybersecurity-top-story, mobile-phone-hack, mobile-security, nso-group-spyware, pegasus, security, spyware, web-monetization
7 Ways To Keep Your Mobile Phone Secure Post date June 4, 2021 Post author By Cyril James Post categories In cyber-attacks, cyber-security, hacking, mobile-phone-security, mobile-security, phishing-attacks, security, smartphones
Why You Should Protect Your Cell Phone Number and How to Do It Post date May 29, 2021 Post author By Zen Chan Post categories In cellphone, cybersecurity, howto, infosec, mobile-phone-hack, mobile-security, social-engineering, social-engineering-attacks, web-monetization
SIM Swap Fraud is Rising: A New SIM-Based Auth API Comes to the Rescue Post date May 28, 2021 Post author By tru.ID Post categories In cyber-security, digital-identity, fraud-detection, good-company, identity-verification, mobile-security, sim-swap, two-factor-authentication
3 Tips To Prevent Mobile Banking Trojans Post date May 4, 2021 Post author By Saif Ahmed Khan Post categories In cyber-attack, cyber-security-awareness, cyber-threats, cybercrime, cybersecurity, cybersecurity-tips, mobile-security, security
The Mobile App Security Checklist for Developers to Avoid Application Security Breaches Post date February 22, 2021 Post author By Usman Khalid Post categories In cyber-security-awareness, devops-security, mobile-app-development, mobile-app-security, mobile-app-testing, mobile-application-development, mobile-security, secure-applications