Six (6) Android Games You Should Play Now not Tomorrow

Got a new device? You need to get some new games. Here are some quick recommendations for great Android games. Some are familiar from other platforms. Some are free. Some are paid, and some have specific hardware requirements. All are listed here.
1.  Minecraft Pocket Edition
Why it is great: Minecraft is an entertaining block-building and survival game. You can play either in creative mode where you build and invent things in your own randomly generated world or you can play in survival mode where you use your wits and resources to survive against the creepers who come out at night.
Note – this does not connect with your main Minecraft account if you play the computer version of the game.
Play for yourself or keep it around to entertain kids. (Turn off in-app purchases if you do this.)
Minecraft is a paid app ($6.99) but you can find occasional sales, in-app purchases run from $0.50 to $1.99.   More »
2.  Lara Croft Go
Based on the popular Tomb Raider series and developed by Square Enix, Lara Craft Go is a relatively simple but very addictive puzzle game you can take with you. The puzzles are designed for short bursts of play, so pull it out in the doctor’s office waiting room or while riding the bus home.
Lara Croft Go sells for $4.99 but is occasionally on sale for $0.99. It allows in-app purchases. If you like this game, you can also check out Hitman Go, which is also from Square Enix.  More »
 
3.  Buttons and Scissors
This is a free puzzle game where you try to cut matching color buttons off of a square of denim. Mechanically this feels similar to Bejeweled, but not completely the same. The logic puzzles offer great challenges for players of all ages.
The other big advantage to this game is that it does not require any connectivity. You can play this game on devices that aren’t connected to Wi-Fi or in that signal dead spot.
Buttons and Scissors is a free download but allows in-app purchases.  More »
 Did you want to try out the new trend in adult coloring books, but you don’t want to carry around coloring pencil and a coloringb book? Try out this app instead. It’s appropriate for kids or adults, and while it’s not the same as coloring in an actual coloring book, it is still very satisfying.
Mandala Coloring Pages is free (with ads) but also allows in-app purchases.  More »
Yes. You can play an Android version of Portal. This is a real console game. As such, it requires a real console. This version will only work on the Nvidia Shield version of Android TV.  The Nvidia Shield starts at around $199 but allows you to stream movies and play Android games on your TV.
Portal starts at $1.99 but this is “introductory pricing.”  More »
If you have a phone with a fast processor and terrific screen display, you can take it for a ride with this virtual reality game. This is a first-person shooter where you aim at balloons. You’ll need Google Cardboard. This is an inexpensive accessory that you can either make or buy for around $15 and will turn your phone into a virtual reality device. Obviously not a game you can play while waiting in a doctor’s office (unless your doctor is awesome) but a fun novelty game to play by yourself or after having one of your friends try on the headset.
VR Cardboard Shooter 3D is a free download.  More »









Disclosure: This page may contain external affiliate links that may result in us receiving
 a commission if you choose to purchase said product. The opinions on this page are our own.
 We do not receive payment for positive reviews.

How to stop mobile Malware before the damage is done

107

 

 

How to stop mobile Malware before the damage is done

 The proliferation of mobile devices has given cybercriminals a vast and growing new ecosystem to work with. And they’re starting to take advantage of that opportunity. According to McAfee’s Threats Report: Fourth Quarter 2011, the number of mobile malware samples jumped from less than 150 in the third quarter of 2011 to well over 400 in the fourth quarter.

“Cybercriminals are going for [mobile] because people put a lot of identifying information on their devices,” says Karim Hijazi, Founder and CEO of Unveillance, an IT security intelligence provider. “But that’s a scary mistake because devices are actually more vulnerable.”

Between the characteristics of mobile devices that make them easy targets to the careless way that most users handle security on them, the mobile landscape presents a vast, simplified attack surface for cybercriminals to exploit. Here’s what you need to know to avoid being a victim.

The soft underbelly of mobility
The relative newness of the mobile market combined with its rapid growth has created two distinct vulnerabilities. The first is that neither security awareness nor available technologies have caught up to the market to protect devices. Second, apps are being developed at record speed to feed voracious user demand, and hastily written code is typically fraught with security holes.

On top of that, an increasing number of apps rely on access to browsers in order to run, but mobile browser platforms aren’t as hardened yet through use, trial and error. So security isn’t being built into the apps or the browsers on which they run (yet).

Small screen sizes are another factor. Users may accidentally click on links or emails they intended to delete due to the finger-to-text-size differential, a phenomenon known as “fat fingering.” Also, small screen sizes may hide some of the signs that might typically signify a lurking danger, like overly long URLs or a lack of identifying credentials on a site.

Types of mobile attacks
The methods for attacking mobile devices are surprisingly run-of-the mill. But this makes sense if you accept the prevailing theory that the lines between smartphones, mobile devices and traditional computers are blurring more and more.

  • Email: The same rules apply to email on mobile devices as on laptops and desktop computers. Don’t open unknown emails and click links in them. You could end up on an infected website that loads malware onto your device.
  • Browsing: Surfing the unknown Web can infect your device. Known as a “drive-by infection,” malicious sites lie in wait for web traffic to come cruising by, then load malware onto their visitors’ devices. You could end up on an infected site by clicking an unknown link in a display ad or even from a list of search results.
  • Apps: Some innocent-looking apps may appear to be providing a simple convenience, but have insidious intent beneath the surface. Tricky coding in malicious apps can open a backdoor to your device and transmit your data back to another location. A more sophisticated app may even open a reverse proxy and gain access to your device’s file system.

Mobile security best practices
You can better secure your device using a number of strategies—and most of them have to do with your own habits around how you treat your device.



“If you can get in the mindset that your device is just as subject to infection as anything else, that’s step one,” advices Hijazi. With that in mind, Hijazi offers the following advice:

  • Do unto your device as you would unto your laptop: Basically, follow the same precautions around unknown emails, links or websites as you would when using your laptop or any other computer.
  • Avoid unfamiliar wireless networks: Many people log into the nearest Wi-Fi connection to avoid racking up data minutes on their plan. But this behavior exposes your device to a murky pool of unknown users. Broad public connections, such as at an airport waiting lounge for example, have no security protocols in place, so it would be very easy for anyone lurking nearby with a device to spy on your activities and maybe even harvest some data.
  • Don’t plug your device into any old computer (and vice versa): Keep in mind that many mobile devices are also storage devices. The same precautions that apply to unknown USB sticks apply to devices. You could unknowingly infect a computer even though you were just plugging in for a quick charge.
  • Don’t download any old app: Look into prospective apps before downloading them to your device. User reviews are a good starting point. Conduct a web search on the app developer to be extra cautious.
  • Turn on installation password protection: Don’t allow your device to download anything without your permission. Turn on download alerts and designate a password for all installations.

Security technology will undoubtedly catch up with current threats to mobile devices. However, no matter how sophisticated the attacks or security technology becomes, the most important factor in maintaining security on a mobile device will always be user behavior.








Disclosure: This page may contain external affiliate links that may result in us receiving
 a commission if you choose to purchase said product. The opinions on this page are our own.
 We do not receive payment for positive reviews.

Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time
Comments