Generally speaking, the majority of us are concerned about our security and privacy at all times, and since most, if not all of us are rocking a mobile device of some description, the same rules apply therein. Whenever software makers put our sensitive data into potentially precarious positions, we call for heads to roll, however, despite small oversights by software developers potentially leading to dire consequences, the onus is just as much on us to arm ourselves against situations which could see our data accessed, stolen or used for unscrupulous ends.

Continue reading... »