Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and followers. Geo-location or geo-tagging can ...
Read Blog
“SMiShing” is a silly word—even sillier than “phishing,” but equally dangerous. Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. The term is a reference to the scammers’ strategy of luring the victim ...
Read Blog
McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones are lost or stolen, and the consequences of these lost cell phones on various organizations. Among the 439 sample organizations, the number of missing smartphones is significant: 142,708 in one year. Approximately 62% of smartphones ...
Read Blog
We lose stuff. You put something down, you get distracted, you forget about it and it’s gone. Stuff falls out of our pockets and bags all the time. I’m one of those people that’s so smart, I’m stupid and absent minded when it comes to my stuff. Where’s my wallet, where are my keys, where’s ...
Read Blog