Tutorials & Best Practices
Goddess's phone gets compromised - what should we pay more attention to in mobile security?
Where the story startsWith the accelerated internet process, the mobile internet, as a new-generation internet carrier, has been widely used...
Dec 30, 2016 10:01 AM
from Board -
Tell my fans
Currently the main solution is personal security awareness. I’d like to popularize the common hidden dangers. Many iPhone users haven’t real...
(Jan 9, 2017 9:49 AM)
But all in all, the phone's permissions and security are often in conflict. If you grant permissions, the chance of privacy informatio...
(Jan 6, 2017 10:37 AM)
Today the network has been increasingly advanced. Cloud terminals, network terminals and various other terminals have been emerging, while t...
(Jan 5, 2017 10:32 AM)
I would like to share my practices. Comments welcomed. After you unmount the storage card and SIM card, first reset the phone to the factor...
(Jan 4, 2017 14:59 PM)
The current network security issue cannot be neglected, especially the rampant information leakage on mobile devices. So to safeguard our pe...
(Jan 3, 2017 11:01 AM)
Many people think it is safe to reduce the user information and phone application permission, and in particular, never root the phone. But...
(Dec 30, 2016 15:10 PM)