Mobile Software News. Read the latest stories about software from Mobile Industry Today.
Showing posts with label McAfee. Show all posts
Showing posts with label McAfee. Show all posts
Saturday, November 17, 2012
McAfee Mobile Security to protect mobile devices
McAfee has announced improvements to the software McAfee Mobile Security. Now, users of smartphones and tablet computers with Android can use the extra privacy, prohibit applications to access personal data without the user's knowledge.
With these new features consumers have access to an additional layer of protection to ensure that their privacy, and protection against financial fraud, identity theft and viruses. In the McAfee Mobile Security uses technology App Alert - the only commercially available technology, which not only tells the user the powers granted to applications, but also sends a query to the database network McAfee Global Threat Intelligence, containing information about the reputation of URL-addresses, to inform the user about the applications that are associated with dangerous Web sites, and (or) suspected of sending personal data to dangerous Web sites (for example, Web sites used by spyware and adware).
The volume of mobile applications is increasing proportionally to the volume of use of mobile devices. According to the company Google, published at the beginning of this year, the Android platform has been downloaded 20 billion applications, according to a recent analytical report by comScore, on the use of social media on mobile devices, 33 percent of applications requesting the user more power than they need. Publication Faculty of Electrical Engineering and Computer Science, University of California at Berkeley, on the system of power in Android, says that 97 percent of users do not understand how the authorities relate to the risks associated with a particular application. In addition, a division of McAfee Labs found that about 5 percent of the applications in its database associated with dangerous URL-addresses. After receiving authority such applications may violate the privacy of the user and his or her privacy.
Subscribe to:
Posts (Atom)