With the cyber threats faced by mobile phone users uprising at an alarming rate, app permissions became a crucial step in securing our devices. Kaspersky Lab detected almost 6 million malicious installation packages and more than 94.000 mobile banking Trojans. Mobile apps need permissions in order
Almost any business can benefit from having a mobile workforce. While enterprise mobile devices and Bring Your Own Device (BYOD) smartphones can increase productivity and efficiency, there is a downside that any business manager must take into consideration: lost or stolen smartphones containing
Innovators are coming up with various new ways to pay for things, helping us simplify our lives in the process. After years of credit card reign, wearable payment devices are the next big thing. From smartwatches, fitness trackers and wristbands to clothing and jewelry, the huge potential of the
Another “S” year is upon us. What does that mean? Apple just started shipping its successor to the iPhone X, the iPhone Xs (along with the new midrange Xr). As custom has it, every two years Apple releases a completely revamped iPhone – but between these releases, they only update the device
Strong encryption of communications and data, which can both deliver security and privacy for individuals, has been in recent years a subject of public debate. Large-scale adoption of the technology made it difficult for the intelligence and law enforcement communities to perform their surveillance
Nowadays, manufacturers are constantly seeking ways to make their displays and touch screens lighter and one of the most sought-after goals is developing flexible screens. Important resources are being invested toward flexible and wearable electronics that can be bent, folded, or stretched while