Fight mobile malware with MTD

Protecting your business data goes beyond making sure your office computers and networks are safe. Because of this, businesses are recognizing the importance of a mobile threat detection (MTD) strategy, which puts up barriers in your company’s mobile devices in order to block mobile malware and other threats. Here’s what you need to know about […]

Android users welcome Microsoft Edge

Have you ever been glued to a long, interesting article on your mobile device? You then arrive home, turn on your PC or laptop, and want to continue reading the article. What’s the quickest way to transition? Microsoft’s Edge browser has a pretty cool solution. Why Microsoft is expanding Edge to mobile Microsoft’s Windows Phone […]

Hidden Android O features you should use

Did you know that you can snooze notifications in your Android devices? That’s right, you can snooze not just your alarm but also notifications across all your devices so you can concentrate on more pressing tasks at hand. Here are several other little-used features in Android Oreo that can help you work smarter. Notifications More […]

Android users beware: Ransomware is coming

You are probably familiar with desktop-based ransomware like Petya, WannaCry, CryptoWall, and CryptoLocker. But mobile ransomware is an emerging trend you don’t want to learn about only after it strikes. Take a minute to read our summary of mobile ransomware and some easy prevention tips. How does ransomware make it onto your Android device? Like […]

iOS 11 doesn’t have these Android features

The soon-to be released iOS 11 will be packed with features and enhancements, including a Files app, customizable Control Settings, and a Dock that allows users to switch between apps easily, among others. Long-time Apple users may be thrilled, but Android loyalists will likely be unmoved. That’s because iOS 11 still doesn’t have these essential […]

Google adds phishing defenses for Android

Although hackers are known for unleashing a host of malware to infiltrate critical networks and devices, phishing emails are their most effective attack method. This scam preys on the trust of computer users with seemingly innocuous emails that request for login credentials or prompt a file download. Unlike other attacks, phishing requires only a convincing […]