What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Mobile Security

Yes, You Can Record a Phone Call on Android — Here’s How

In a world where every phone call could be a treasured memory, an important interview or a podcast waiting to happen, your Android device can act as your producer. Yet, when it comes to recording calls, it might not cooperate like you expect. For some lucky users, call recording is . . . Read more

Apple Operating Systems are Being Targeted by Threat Actors, Plus 4 More Vulnerability Trends

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%, according to a new report. The Software Vulnerability Ratings Report 2024 from patch management software company Action1 also found that Microsoft Office programs are becoming more exploitable, while attackers are targeting load balancers like NGINX and Citrix . . . Read more

Sekoia: Latest in the Financial Sector Cyber Threat Landscape

A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted by QR code phishing. The financial industry also suffers from attacks on the software supply chain and stands among the most . . . Read more

New SecuriDropper Malware Bypasses Android 13 Restrictions, Disguised as Legitimate Applications

A new malware is bypassing an Android 13 security measure that restricts permissions to apps downloaded out of the legitimate Google Play Store. A new report from ThreatFabric, a fraud protection company, exposes SecuriDropper malware, which is capable of bypassing Android 13 restricted settings. The malware makes Android consider the . . . Read more

How to Associate an Apple ID with a Second iPhone That Has Completed Setup

Learn how to easily associate an Apple ID with a second iPhone to access all your apps, media and iCloud services seamlessly with this step-by-step guide. There are several reasons you might use two iPhones with the same Apple ID. You might link a second iPhone to your Apple ID . . . Read more

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually. Image: ink drop/Adobe Stock Security researchers from three universities have discovered a major vulnerability in Apple’s iOS and macOS, including the Safari browser. The vulnerability, which the researchers . . . Read more

Common Errors When Connecting Multiple iPhones to One Apple ID

Although connecting two iPhones to the same Apple ID has its advantages — including expanding your or a partner’s access to your documents, spreadsheets and presentations — unpleasant surprises can arise such as unintentionally revealing contact and calendar information and mistakenly sending texts from the wrong number. Whenever associating two . . . Read more

Learn How to Protect Your Business With Ultimate Security for $80

Protect your company by learning maximum security practices in this bundle, while it’s available at the best-on-web price of only $79.99. Image: StackCommerce While cyberattacks can create serious long-term challenges for individuals, they can literally bring down your business in a number of ways. According to Forbes, “…every company is . . . Read more