article thumbnail

US athletes told to use burner phones at Beijing Winter Olympics

The Verge

In 2019, China was caught secretly installing spyware on tourists’ phones who entered from the Xinjiang region. Athletes will likely be relying on their mobile devices to stay in touch with friends and family, which could be more complicated on a burner phone that comes with limits on mobile data, texting, and calling.

Spyware 110
article thumbnail

How Can Educational Institutions Mitigate Cybersecurity Threats in Education?

Kitaboo

Cybercriminals often use mobile IoT devices to get inside the institute’s network. Hence, educational institutions must include mobile security as a part of their cyber security strategies. Therefore, educational institutions should invest in firewalls, intrusion detection, and virus and malware protection systems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Stop Malware Attacks and Online Identity Theft

Galido

Affecting a mobile phone, a computer, a laptop, or a network server, malware interrupts computing operations, hijacks networks, or access systems. The modern and common types of malware, such as the viruses, worms, spyware, adware, Trojans, and Zombies, primarily target confidential personal, business, or financial information.

Malware 68
article thumbnail

Hygiene does not only protect you against physical viruses

Dataconomy

By requiring users to provide an additional verification method, such as a unique code sent to their mobile device, even if an attacker obtains the password, they won’t be able to access the account without the second factor. Enable two-factor authentication Two-factor authentication adds an extra layer of security to your accounts.

Malware 68
article thumbnail

What?No Angry Birds? - A Screw's Loose

A Screw's Loose

There’s nothing wrong with trying to protect your users from malicious apps, malware and spyware. Is the best way to handle that to cut off the streams at the firewall? Next post: 10 plagues of Mobile. Going Mobile. Enterprise Mobility. Enterprise Mobility. Mobile Strategy. Is it a bad thing?

Mobile 68