mobile technology

dimanche 29 janvier 2017

Three Simple Steps You Can Do Today to Enhance Your Information Security

There are two types of users. Those who say they have nothing to hide and conceal, and those who use all possible methods of data protection to keep their personal information secure.
This article is for the first type of people or for those who are somewhere in between. People of the second type are aware of these techniques and apply them in practice almost every day.
So what should you do today to ensure information security?

  1. Make a backup copy of important data.
  2. Replace simple passwords by stronger ones.
  3. Make a copy of information stored in the cloud.

Why should you make a backup copy of important data?
Let's start with a question whether there is a need to save a copy of your hard disk on other media. The improvement of software goes side by side with the improvement of malware. Ransomware viruses became especially active. Getting on your computer, ransomware virus blocks the access to your data and requires a payment for decoding them. But often even the transfer of the required sum of money does not solve the issue with the encrypted data. In such a case these data may be considered as lost forever.
Unfortunately, such cases are common. You can get a malicious code even via a simple JavaScript in your browser. Thus, if you copy important personal data to removable data carriers at least sometimes, you will have a chance to recover at least a part of the lost information and protect it against fraud.
Why should you change your passwords?
In the fall of 2015 was published a list of the most popular passwords of Ashley Madison website. And at the end of 2015 year, we got an opportunity to see a list of the worst passwords used in 2015. According to these lists, which coincide in the majority of points, people do not like to complicate their lives and choose simple passwords. They keep using such easy combinations as 123456, password, password1, qwerty, etc. Coming up with a new password, try to make it very complicated for it not to be brute forced.
But still, even this is not enough. Unfortunately, online fraudsters are constantly improving their skills, and soon there will be not a single password they would be unable to get. Then how to protect your personal data? In fact, you cannot rely only on passwords, thus the best way to protect your data is to use at least two-factor authentication where it is possible.
2-factor authentication presupposes the use of two different factors of authentication when logging in the account. The first factor is something you know (usually it is login and password), and the second factor is something you have (usually it is one-time password generated with the help of OTP token or application on the smartphone, also it can be delivered via SMS or the voice call).
Thus, even if a fraudster hacks your main password, he won't manage to go through the next authentication step. And vice versa, even having the one-time password generator (token) or your phone, the fraudster will not be able to log in without knowing a static password. Two-factor authentication is especially important for bank accounts or corporate e-mails.
But even using 2FA you shouldn't forget that static passwords play an important role in two-factor authentication as they are one of two factors - a knowledge factor.
Why should you make a copy of the information from the cloud?
How many times we have already seen the faces of users who suddenly couldn't find important documents, which they stored in cloud services. And this may happen to anyone. So next time when you think of leaving the important information in your account in Gmail, Dropbox, or any other service, think twice and make a copy on your hard disk.

Article Source: http://EzineArticles.com/9505477

jeudi 12 janvier 2017

How to Perform Android Battery Testing

The rapid battery discharge is one of the most widespread problem of today's reality. Modern smartphones or tablets contain advanced features and they are full of diverse capabilities. But all this is the reason why software testing company should work harder than ever.
Frequently, users make some manipulations with their devices: switch off cellular data or select low power mode which reduces power consumption. For these reasons, QA specialists should execute thorough testing of battery to understand how much power is consumed by a certain application.
Usually, special testing tools are used to check battery consumption. Let us make an example how to check Android battery, using Battery Historian testing tool. Before proceeding directly to test process, one should consider the operation peculiarities of battery historian tool itself.
Battery Historian Tool Peculiarities:

  • it is a Google tool;
  • requires knowing of programming (at least command line);
  • it is an open-source Python script;
  • works on Android (starting from 5.0 version and later);
  • analyze battery on the basis of Android bug report files;
  • operates on Mac OS, Windows, and Linux.
The list above proves that this tool is rather effective. All you need to execute battery testing is to meet some requirements:


  • activate USB debugging on Android device;
  • install Python in the system;
  • Android Debug Bridge (adb) presence.
Only after all requirements are met, QA team may start test process. Usually, the test procedure, using Battery Historian tool consists of five stages.

5 Stages of Android App Testing via Battery Historian Tool:

  1. Removing all previous stats - first of all, to execute accurate testing, a tester should clear all stats in order to achieve relevant data (Adb command will look this way: "adb shell dumpsys batterystats --reset").
  2. After the statistics is cleared, the specialist should disconnect device from the system.
  3. Execute diverse test scenarios in order to define what consumes the most of power. It is important to behave like the user to better realize the impact of user experience on battery lifecycle.
  4. Connect device to the system again and create a bug report (Adb command will look this way: adb bugreport > batterydata.txt). On the base of this log file, the tool may get statistics of the device battery.
  5. Download Battery historian tool to be able to generate HTML report, using Android log file (Use this command: python historian.py batterydata.txt > batteryinfo.HTML).
Therefore, mobile testing, integration checking, multi-platform testing, load control, usability testing, and other standard types of QA activity may be added with such kind of checking as battery testing.

Article Source: http://EzineArticles.com/9614379

mardi 3 janvier 2017

How to Stay Safe Online - General Advice and Tips

Viruses, ransomware, scams, identity theft and loss of digital information are becoming more and more common as we move towards a digital age.
With digital security becoming more apparent, it is very important to adopt a good habit in keeping yourself and your family safe online. Below are some basic tips and hints to protect your identity, files and your personal device.
Keep your computer, smartphone and tablet clean

  • Keep your device up to date with the latest software
    Software updates provide enhancements and security updates.
  • Keep your security software (anti-virus) up to date
    Security software needs latest virus definitions to identify new and emerging virus/malware. Yes, even Mac's and smartphones needs security software.
  • Scan external devices (USB)
    USB and external devices can carry virus from infected devices onto yours. Make sure you enable external device scanning to ensure it doesn't get onto your computer

Be very web savvy online

  • Watch out for dangerous links and attachmentsWhen there is doubt, delete it. Links/attachments in emails, tweets, SMS, posts and advertising are way cyber criminals can compromise your device. If its suspicious or too good to be true, delete it, block or mark it as junk.
  • Check for trusted websites
    When banking online or shopping, ensure they have SSL (secure socket layer) security. SSL protects passwords and your banking information securely.
  • Beware of Phishing
    Phishing is a way for cyber criminals to mask legitimate website with their own to steal your confidential login. Do not click on any requests to verify your password unless you requested it.
  • Risks with public Wi-Fi Hotspots
    Adjust your security level on your device when accessing public networks. Your device firewall and anti-virus can detect and adjust automatically when connecting to different networks. Turn off your Wi-Fi to public networks when you don't need to use it anymore.

Protect your personal information

  • Keep your password complex
    Don't use generic password. Keep it complex with the combination of upper case/lower case characters, numbers and symbols. If it's too hard to remember, use a secure password manager to keep track.
  • Use Two Step Verification
    Two step verification will make it more difficult to access you online presence. If a cyber criminal has your password, they will be stopped if they don't have access to your other devices and accounts.
Article Source: http://EzineArticles.com/9418828