Has Your Smartphone Been Hacked?

2111201660% of all Kenyan adults possess a smartphone today. We need these gadgets with us all the time since they help us navigate in today’s digitized society. They take high-quality pictures, it’s a quick access to latest news and entertainment. They connect us to people through social media and interaction is easy without the need of postal services. These gadgets make us feel connected to the world.

However, smartphones contain almost 80% of our personal data and to some 100% of their lives are contained in these gadgets. Personal data include bank PINs, passwords, credit card numbers, very personal messages and emails you name it. Even though these gadgets make navigation through life easier, it increases the risk of being hacked and personal data stolen or exposed.

44238790-Hacker-is-stealing-information-from-a-mobile-phone-Stock-Vector Viruses are designed to steal information and sometimes it is very hard to know if you are hacked or if it is just the phone that has issues. This is because, most viruses hide in the “background” and are harder to detect. The main question here is how can you know if you are hacked? If your phone has been infected, it may show sudden erratic behaviors that affect the connectivity and usability of your phone. Other signs may include, unauthorized charges and transactions to your credit card or bank or the phone seem unresponsive, text messages and calls that you did not make etc.


  1. Do not download data from unknown sources and take time to research and read reviews before downloading anything to find out if it is legit or not.
  2. The best way to keep your phone safe is to purchase an appropriate antivirus and always keep it up to date. ESET Mobile security for example has features that secures every inch of your phone starting from anti-phishing  to SMS.

best-mobile-antivirus-appESET mobile security has anti-theft features that locks your smartphone in case your phone gets stolen and therefore protects your personal information. Other than that, it facilitates tracking of your gadget whenever it is stolen and many more.



Stay protected and enjoy safer technology with ESET.







Selecting the best patch management software for your company

Its every business desire to have the right software in  order to protect its assets and importantly remain compliant. Patch management is an easy concept to understand, and it is the software that automates the process is an easy product to grasp. What’s difficult and requires insight, however, is the process through which a business purchases patch management software.

This article basically gives tips on the buying out process, explaining patch management process and even giving out few vendors that could best assist in addressing  management strategies.

The suitable patch management software for your business should offer many benefits beyond increased productivity and efficiency. It should helps companies remain secure from exploitation by hackers. This, in turn, can cause a great loss of assets.

Regulatory compliance is also another important area that can be secured with patch management tools. This enables businesses to give priority to certain operating systems and software in the patching process

To hence take advantage of the important and protections benefits that the software can offer, having a know how on how procure the right tool is substantial. Assessing the product’s usability, the systems it integrates with and how, and its features are just ways to ensure that the right patch management tool is chosen. Prioritizing a business needs means that a business is then ready to select the best patch management software for them.

TipsIn procuring the best  software, there is need to read and know about the different business use cases where an enterprise would need automated patch management tools, how they alleviate productivity and resource issues and can help mitigate risk. This will help achieve at a decision on the best software to go for.

patchIt’s important to learn on how to evaluate the software tools. These covers a wide range from cost to functionality. ESET Antivirus for example offers the cost of its products while also explaining their functionality to its customers for easier purchase. This helps an organization or company know which software to buy.

Selecting the right software means an organization must match up its patching strategy needs to vendors’ offerings, the systems tools which integrate with and the budget the business has set aside.

The most suitable software for an organization is then a software that closely matches its patch management and its overall strategies and within its budget. Follow this tips and get the best deal for your company.








gmail-phishing-scamIn the past years, hacking and phishing has evolved to a whole new level. This leaves us wondering will you know you are being hacked or even if it’s just a scam that can cost you loads? Today if you were to receive a scam email, how confident are you that you would not open or download any attachments?

According to previous reports, 40% of fraudulent e-mails are opened and attachments downloaded. The numbers may seem small and harmless but in the world of e-mail open rates, that is poisonous. On this note, it is scary that Gmail phishing is on the rise since it is going beyond bounds to effectively trick users.

maxresdefaultHow it works

The new tactics are so good that the e-mail will not fall under the scam folder. This is why Gmail scams are affecting many victims. First and foremost, it all begins by receiving an e-mail from someone you know and maybe trust. Someone that may have been hacked and account stolen. The email contains information that looks familiar.

This familiarity of the details makes you open the email and even download the attachments. At one look everything looks legitimate to you. When downloading or previewing the attachments, it will take you to a Gmail login page that looks so real with no grammatical errors or even unrelated images and the graphics are perfect. The only error would be in the URL but who checks when the rest is fine? At the start of the URL, you’ll see “data:text/” and yet it should not exist. You may also see a green lock symbol at the start of the URL if you are using Chrome.12

For the many who do not take note of the above, just quickly sign in and once the submission of your credentials is successful, everything is over and you know become the victim with your email being used to scam others. With your account in the hand of the hacker, they are now poisoned to compromise your personal and professional life and that may just be the beginning.

This does not happen only to Gmail users. Everyone is in danger. It only takes one to be naïve and lack legitimate and proper antivirus software that would have noted the phishing emails and the fake redirected cite. ESET products have the sole purpose of protecting you against this situations, whether on your mobile phone or tablet or computer. Enjoy safer technology today with ESET.