What is the impact of someone accidentally getting my IMEI number from my Android phone?

I have a concern regarding how risky it is if someone knows or has the copy of my 2 IMEI numbers. As we all know, on Android phones, the IMEI are at the back cover of the phone like a sticker.
So, my question is, what if someone intentiona… Continue reading What is the impact of someone accidentally getting my IMEI number from my Android phone?

How seriously should we take this commentary from John McAfee? If it’s serious, what do we do? [closed]

This question refers to this YouTube video of John McAfee
Because videos can disappear, I’ve provided a screenshot and transcript (transcribed by me, so please forgive errors)
What John is saying sounds pretty serious, but to what degree i… Continue reading How seriously should we take this commentary from John McAfee? If it’s serious, what do we do? [closed]

Pixalate tunes into $18.1M for fraud prevention in television, mobile advertising

Pixalate provides fraud protection, privacy and compliance analytics for connected television and mobile advertising. Continue reading Pixalate tunes into $18.1M for fraud prevention in television, mobile advertising

Is there a thing as a small bag which BOTH blocks signals AND sound for securing a mobile phone on the go? [closed]

I’ve been hunting for this for a long time. I’ve been able to find "Faraday" bags that (allegedly) block signals to/from the surveillance unit (phone), but they never mention anything about soundproofness, which is just as import… Continue reading Is there a thing as a small bag which BOTH blocks signals AND sound for securing a mobile phone on the go? [closed]

Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors

Why rebooting your smartphone is good security hygiene, the FBI reveals top targeted vulnerabilities in the last two years, and details on how a nation state used a “flirty” aerobics instructor to steal data from defense contractors. ** Links mentioned… Continue reading Reboot Your Smartphone, FBI’s Top Targeted Vulnerabilities, Flirty Account Dupes Defense Contractors