Extend Mobile Call Time with Battery Optimizer

Nowadays, most people are constantly on the go–multi-tasking while moving from one place to the next. The majority of the time this results in sales pitches, meetings and important discussions being conducted over our smartphones. This means, the successful completion of your call is reliant on the battery life of your trusted mobile device.

Picture this: you’re on the bus to work and you’ve got to dial into an important call. You look at your phone and, to your dismay you neglected to charge it overnight. Your battery life is at 10%, and you’re now at risk of missing the call entirely or dropping off at an inopportune moment.

So, what do you do? You spend the whole conversation unfocused, fearing that your call will be cut off because you have no idea how many minutes of battery life you have left.

Now that doesn’t sound like an ideal situation, does it?

What if your Android phone would automatically notify you when the battery is running low during a call–prompting you with available conversation time left PLUS a way to extend it as much as possible? Thankfully, Intel Security Battery Optimizer includes a feature that allows your mobile device to do just that!

The Call Helper Alert feature within the Battery Optimizer app instantly prompts you when the battery on your phone has less than 20 minutes of call time left. You can also adjust this option in the settings so it will alert you at 10, 20, 30 or 40 minutes, depending on user preference.

As shown below, the alert pops up during an incoming or outgoing call and offers the option to lengthen call time by 10 more minutes. Simply click the ‘extend’ button and Battery Optimizer will shut off other, non-core apps that are draining battery life in the background, reducing the likelihood that you’ll have to deal with the annoyance of cut-off conversations.

Screenshot 2d Update V2

Intel Security Batter Optimizer is a simple, smart, and accurate way to extend battery life of your mobile device. You can now download the Intel Security Battery Optimizer Android app for free from Google Play.

And as always, to keep up with the latest security threats, make sure to follow @IntelSec_Home on Twitter, and Like us on Facebook.


Strengthen Your Digital Defenses with the 5 Habits of Practically Unhackable People

At the start of the year, we all made our resolutions for 2015. Now it’s March—how are you doing on your resolutions? If you’ve already broken a few, no worries; New Year’s doesn’t have the monopoly on making goals to better yourself. This is especially true with digital safety. At a time when there are so many security breaches, it’s important to commit to strengthening your digital defenses year-round.

When making goals, it’s important to emulate people who have already mastered what you’re trying to learn. So in this case, what do super secure people do to stay safe online? Intel Security has the answer—here are the 5 habits of practically unhackable people:

  1. Think before they click. We click hundreds of times a day, but do we really pay attention to what we click on? According to the Cyber Security Intelligence Index, 95% of hacks in 2013 were the result of users clicking on a bad link. Avoid unnecessary digital drama, check the URL before you click and don’t click on links from people you don’t know.
  2. Use HTTPS where it matters. Make sure that sites use “https” rather than “http” if you’re entering any personal information on the site. What’s the difference? The extra “S” means that the site is encrypted to protect your information. This is critical when you are entering usernames and passwords or financial information.
  3. Manage passwords. Practically unhackable people use long, strong passwords that are a combination of upper and lower case letters, numbers, and symbols. Yet, unhackable people don’t always memorize their passwords; instead, they use a password manager. A password manager remembers your passwords and enters them for you. Convenient, right? Check out True Key™ by Intel Security, the password manager that uses biometrics to unlock your digital life. With True Key, you are the password.
  4. Use 2-factor authentication (2FA) all day, every day. When it comes to authentication, two is always better than one. 2FA adds another layer of security to your accounts to protect it from the bad guys so if you have the option to use 2FA, choose it. In fact Intel Security True Key uses multiple factors of authentication.
  5. Know when to VPN. A VPN, or virtual private network, encrypts your information, which is especially important when using public Wi-Fi. Practically unhackable people know that they don’t always need a VPN, but know when to use one.

To learn more about the 5 habits of practically unhackable people, go here. Like what you see? Share the five habits on Twitter for a chance to win one of five prize packs including a $100 gift card to Cotopaxi or Hotels.com.*

You don’t need to wait for another New Year to resolve to become a digital safety rock star – start today!

*Sweepstakes is valid in the U.S. only and ends May 16, 2015. For more information see the terms and conditions at intel.com/5habits.
RobertSicilianoRobert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

2015 Cyberthreat Defense Report Spotlights Changing Security Trends

The CyberEdge Group has released their exhaustive 2015 Cyberthreat Defense Report, jam-packed with insights regarding the latest identified security trends for North America and Europe.

The CyberEdge Group bill themselves as “Premier Research and Marketing Services for High-Tech Vendors and Service Providers.”

The 41-page PDF report collects data from surveys of over 800 “qualified IT security decision makers & practitioners.” Trends covered span network breaches, cyber attacks, phishing, malware and zero-day events. Also reported on are companies’ security and IT budget trends and the current states of mobile security, threat intelligence and security monitoring.

CyberEdge calls out specific highlights of the report, including:

  • 71% of respondents’ networks breached in 2014, up from 62%
  • 52% of respondents believe a successful attack is likely in 2015
  • 61% of IT security budgets are rising in 2015, up from 48%
  • Phishing, malware, and zero-days concern respondents most
  • 59% saw a rise in mobile device threats in 2014
  • Low security awareness among employees is greatest inhibitor
  • 67% intend to evaluate new endpoint security solutions
  • Security analytics most-cited network security technology for acquisition

ThreatTrack Security will also host a webinar featuring Steve Piper, CEO of CyberEdge Group, as he reviews results from the report.

“Insights From CyberEdge’s 2015 Cyberthreat Defense Report” is scheduled for Friday, March 27th at 1 p.m. ET / 10 a.m. PT. Click here to register.

Share via email Share

Tips to Stay Digitally Safe on Spring Break

Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.

But, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep you digitally safe this spring break.

  1. Don’t bring more technology than you have to. Do you really need to bring your laptop, tablet, and smartphone on your beach vacation? The more devices you bring, the more chances for someone to steal or compromise your device and your personal data.
  2. Backup your data. No matter what devices you decide to bring, make sure you back them up before you leave. You don’t know what will happen on your trip, don’t risk your data.
  3. Share when you get home. It’s tempting to share that family picture with Mickey, but it could alert thieves that you aren’t home. Wait until you return home before you share your vacation pictures online.
  4. Review your privacy settings. Just because you aren’t sharing anything from your spring break on social media, doesn’t mean that your friends aren’t. Check up on your privacy settings so you can manage who sees your content, and as best as possible, what others say about you. That embarrassing video of your belly flop doesn’t need to be seen by everyone.
  5. Be careful when using public Wi-Fi. Don’t log on to bank/credit card sites or shop online when using a public Internet connection. You don’t know who else is on your network.
  6. Install security software on all your devices. Use comprehensive security software like McAfee LiveSafe™ service to protect your devices no matter where you are.

Have a great spring break!

RobertSicilianoRobert Siciliano is an Online Safety Expert to Intel Security. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! Disclosures.

Will Apple Watch take wearables to the masses?

This week Apple launched, what it calls “the most advanced timepiece ever created” – the Apple Watch. At an event in San Francisco this week, Apple CEO Tim Cook heralded their new wearable as “the most personal device we have ever created. It’s not just with you. It’s on you.”

With this device consumers will be able to make credit card payments, navigate their way around cities, check into flights and even operate their toasters at just the flick of their wrists. Just as Star Trek predicted, you can even make calls on the Apple Watch using the built in microphone and speaker. We, as consumers, want faster, simpler solutions to manage our everyday lives and Apple has offered us just that.

It is this offer of increased efficiency and ease that is causing the wearable device buzz in the consumer technology industry. In fact, it is predicted that by 2018 the wearable device market will be worth $12.6 billion. You just have to look at the range of devices launched at Mobile World Congress last week to see how big a market this is set to become.

Yet so far, whilst demand has steadily been growing with 21m wearable devices sold in 2014 according to IDC, these devices have yet to truly hit the mainstream. But just as Apple pushed other technology categories into the market and created mass consumer appeal – such as with the iPod, iPhone and iPad – many experts are predicting that the Apple Watch could be THE product we’ve been waiting for to kick start widespread adoption of wearable technology.

And as adoption grows, you can bet that cybercriminals will start to invest more effort and resource into exploiting the very lucrative data made available on these devices. We know that healthcare data sells at ten times the price of credit card data on the black market, and with wearables able to collect and monitor your heart rate and other personal information, consumers will need to take the security of these devices, and the data they collect, seriously.

In addition, we will also need to consider privacy implications that come with some of the apps that track individuals and their activity. Especially so, when you consider that a recent Intel Security report found that 82% of mobile apps were able to track when Wi-Fi and data networks are used and the device’s current and last location. By not taking steps to secure and manage their personal data, consumers are leaving themselves open to having their private information intercepted.

The high-profile nature of the Apple Watch will surely spark widespread interest and adoption of smartwatches and other wearable devices among consumers during 2015. We need to be ready. Securing the vast amounts of data created by these high-tech devices will need to be a number one priority for consumers to keep their personal data well and truly safe in their own hands.

The post Will Apple Watch take wearables to the masses? appeared first on McAfee Blogs.