Kenan:Currently the main solution is personal security awareness. I’d like to popularize the common hidden dangers. Many iPhone users haven’t real...(Jan 9, 2017 9:49 AM)
Charlene:But all in all, the phone's permissions and security are often in conflict.
If you grant permissions, the chance of privacy informatio...(Jan 6, 2017 10:37 AM)
Elizabeth:Today the network has been increasingly advanced. Cloud terminals, network terminals and various other terminals have been emerging, while t...(Jan 5, 2017 10:32 AM)
Blanche:I would like to share my practices.
Comments welcomed. After you unmount the storage card and SIM card, first reset the phone to the factor...(Jan 4, 2017 14:59 PM)
Adolph:The current network security issue cannot be neglected, especially the rampant information leakage on mobile devices. So to safeguard our pe...(Jan 3, 2017 11:01 AM)
Dave:Many people think it is safe to reduce the user information and phone application permission, and in particular, never root the phone.
But...(Dec 30, 2016 15:10 PM)