Extend Mobile Call Time with Battery Optimizer

Nowadays, most people are constantly on the go–multi-tasking while moving from one place to the next. The majority of the time this results in sales pitches, meetings and important discussions being conducted over our smartphones. This means, the successful completion of your call is reliant on the battery life of your trusted mobile device.

Picture this: you’re on the bus to work and you’ve got to dial into an important call. You look at your phone and, to your dismay you neglected to charge it overnight. Your battery life is at 10%, and you’re now at risk of missing the call entirely or dropping off at an inopportune moment.

So, what do you do? You spend the whole conversation unfocused, fearing that your call will be cut off because you have no idea how many minutes of battery life you have left.

Now that doesn’t sound like an ideal situation, does it?

What if your Android phone would automatically notify you when the battery is running low during a call–prompting you with available conversation time left PLUS a way to extend it as much as possible? Thankfully, Intel Security Battery Optimizer includes a feature that allows your mobile device to do just that!

The Call Helper Alert feature within the Battery Optimizer app instantly prompts you when the battery on your phone has less than 20 minutes of call time left. You can also adjust this option in the settings so it will alert you at 10, 20, 30 or 40 minutes, depending on user preference.

As shown below, the alert pops up during an incoming or outgoing call and offers the option to lengthen call time by 10 more minutes. Simply click the ‘extend’ button and Battery Optimizer will shut off other, non-core apps that are draining battery life in the background, reducing the likelihood that you’ll have to deal with the annoyance of cut-off conversations.

Screenshot 2d Update V2

Intel Security Batter Optimizer is a simple, smart, and accurate way to extend battery life of your mobile device. You can now download the Intel Security Battery Optimizer Android app for free from Google Play.

And as always, to keep up with the latest security threats, make sure to follow @IntelSec_Home on Twitter, and Like us on Facebook.


Strengthen Your Digital Defenses with the 5 Habits of Practically Unhackable People

At the start of the year, we all made our resolutions for 2015. Now it’s March—how are you doing on your resolutions? If you’ve already broken a few, no worries; New Year’s doesn’t have the monopoly on making goals to better yourself. This is especially true with digital safety. At a time when there are so many security breaches, it’s important to commit to strengthening your digital defenses year-round.

When making goals, it’s important to emulate people who have already mastered what you’re trying to learn. So in this case, what do super secure people do to stay safe online? Intel Security has the answer—here are the 5 habits of practically unhackable people:

  1. Think before they click. We click hundreds of times a day, but do we really pay attention to what we click on? According to the Cyber Security Intelligence Index, 95% of hacks in 2013 were the result of users clicking on a bad link. Avoid unnecessary digital drama, check the URL before you click and don’t click on links from people you don’t know.
  2. Use HTTPS where it matters. Make sure that sites use “https” rather than “http” if you’re entering any personal information on the site. What’s the difference? The extra “S” means that the site is encrypted to protect your information. This is critical when you are entering usernames and passwords or financial information.
  3. Manage passwords. Practically unhackable people use long, strong passwords that are a combination of upper and lower case letters, numbers, and symbols. Yet, unhackable people don’t always memorize their passwords; instead, they use a password manager. A password manager remembers your passwords and enters them for you. Convenient, right? Check out True Key™ by Intel Security, the password manager that uses biometrics to unlock your digital life. With True Key, you are the password.
  4. Use 2-factor authentication (2FA) all day, every day. When it comes to authentication, two is always better than one. 2FA adds another layer of security to your accounts to protect it from the bad guys so if you have the option to use 2FA, choose it. In fact Intel Security True Key uses multiple factors of authentication.
  5. Know when to VPN. A VPN, or virtual private network, encrypts your information, which is especially important when using public Wi-Fi. Practically unhackable people know that they don’t always need a VPN, but know when to use one.

To learn more about the 5 habits of practically unhackable people, go here. Like what you see? Share the five habits on Twitter for a chance to win one of five prize packs including a $100 gift card to Cotopaxi or Hotels.com.*

You don’t need to wait for another New Year to resolve to become a digital safety rock star – start today!

*Sweepstakes is valid in the U.S. only and ends May 16, 2015. For more information see the terms and conditions at intel.com/5habits.
RobertSicilianoRobert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

2015 Cyberthreat Defense Report Spotlights Changing Security Trends

The CyberEdge Group has released their exhaustive 2015 Cyberthreat Defense Report, jam-packed with insights regarding the latest identified security trends for North America and Europe.

The CyberEdge Group bill themselves as “Premier Research and Marketing Services for High-Tech Vendors and Service Providers.”

The 41-page PDF report collects data from surveys of over 800 “qualified IT security decision makers & practitioners.” Trends covered span network breaches, cyber attacks, phishing, malware and zero-day events. Also reported on are companies’ security and IT budget trends and the current states of mobile security, threat intelligence and security monitoring.

CyberEdge calls out specific highlights of the report, including:

  • 71% of respondents’ networks breached in 2014, up from 62%
  • 52% of respondents believe a successful attack is likely in 2015
  • 61% of IT security budgets are rising in 2015, up from 48%
  • Phishing, malware, and zero-days concern respondents most
  • 59% saw a rise in mobile device threats in 2014
  • Low security awareness among employees is greatest inhibitor
  • 67% intend to evaluate new endpoint security solutions
  • Security analytics most-cited network security technology for acquisition

ThreatTrack Security will also host a webinar featuring Steve Piper, CEO of CyberEdge Group, as he reviews results from the report.

“Insights From CyberEdge’s 2015 Cyberthreat Defense Report” is scheduled for Friday, March 27th at 1 p.m. ET / 10 a.m. PT. Click here to register.

Share via email Share

Tips to Stay Digitally Safe on Spring Break

Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.

But, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep you digitally safe this spring break.

  1. Don’t bring more technology than you have to. Do you really need to bring your laptop, tablet, and smartphone on your beach vacation? The more devices you bring, the more chances for someone to steal or compromise your device and your personal data.
  2. Backup your data. No matter what devices you decide to bring, make sure you back them up before you leave. You don’t know what will happen on your trip, don’t risk your data.
  3. Share when you get home. It’s tempting to share that family picture with Mickey, but it could alert thieves that you aren’t home. Wait until you return home before you share your vacation pictures online.
  4. Review your privacy settings. Just because you aren’t sharing anything from your spring break on social media, doesn’t mean that your friends aren’t. Check up on your privacy settings so you can manage who sees your content, and as best as possible, what others say about you. That embarrassing video of your belly flop doesn’t need to be seen by everyone.
  5. Be careful when using public Wi-Fi. Don’t log on to bank/credit card sites or shop online when using a public Internet connection. You don’t know who else is on your network.
  6. Install security software on all your devices. Use comprehensive security software like McAfee LiveSafe™ service to protect your devices no matter where you are.

Have a great spring break!

RobertSicilianoRobert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

FREAK SSL Bug Forces Security Makers to Scramble for a Fix

On March 3, security researchers noted that an age-old SSL bug—in existence for more than 10 years—allows hackers under the right conditions to exploit a man-in-the-middle attack and gain access to potentially sensitive information.

FREAK (Factoring RSA-EXPORT Keys) SSL relies on outdated ‘export grade’ cryptography settings, which are still contained within some web server code today. According to Mikah Sargent of NewsyTech, approximately 12% of the world’s top 1 million websites are vulnerable to this flaw.

Initially, the bug was determined to affect secure web browsing via iOS, Android and OS X devices, but later in the week, Microsoft issued a security advisory confirming Windows users could also be affected.


In the 1990s, United States policy required that external communications avoid too strong a level of encryption. “Export” grade 512-bit cryptography—meaning more easily breakable than the 1024-bit US crypto—became a standard for external communication.

At the time, 512-bit cryptography was considered much more secure than it is today. In modern times, a hacker can potentially break a single 512-bit key in under a day. In fact, Johns Hopkins University cryptographer Matthew D. Green estimates this could be done in 7.5 hours, renting online CPU resources for about 100 USD.

What this means

The chances of being affected by this bug remain relatively slim. In order for a hacker to utilize FREAK, they would need to:

  1. Find a vulnerable web server that offers export-level encryption and re-uses the same encryption key for long amount of time
  2. Break the current encryption key (using CPU resources + time) before it is reset on the server
  3. Find vulnerable users connecting to the server

With these conditions met, a hacker could potentially execute a man-in-the-middle attack. For example, using unsecured Wi-Fi in a coffee shop, a hacker could intercept and decrypt all traffic between any client and the server, while remaining completely undetectable.

How to protect yourself

You can immediately check if your browser is vulnerable by visiting Tracking the FREAK Attack.

Apple and Google have announced that they will release OS fixes this week. In the meantime, zdnet.com has a detailed article on how to protect you immediately.

Share via email Share