Android, Antivirus, Apple, Crypto Currency, Enterprise, GDPR, Internet Security, iPhone, Mobile

10 Cyber Security trends to look out for in 2018

It is still too early to predict whether 2018 will be safer than 2017 when it comes to cybersecurity. It…

It is still too early to predict whether 2018 will be safer than 2017 when it comes to cybersecurity. It is fair enough to say that this question has been raised since last year wasn’t the best for many IT companies and global organizations. However, experts have already made a few predictions for 2018 based on the current cyber security trends. Let’s have a look at them one at a time:

 

1) A.I. Cybersecurity

Artificial intelligence has come a long way from where it once started. AI-powered programs today are capable of monitoring events which can help identify incoming cyber attacks. However, according to experts, cybersecurity AI may beat the purpose for what it is designed as it may be able to assist hackers in carrying out even more complex attacks. Some have even called them double-edged swords.

 

2) IoT (Internet of Things) with improved security features

Internet of Things, which is a growing topic of conversation today, is the correlation of computing devices with physical objects via the internet, such that they are able to send and receive data. From Apple Watches to Nest Thermostats, IoT will see a growth like never before with some professionals estimating over 20 billion connected units by the end of this year. If anything can cause an obstacle in this positive transformation, it would certainly be a collapse of security. After the massive amounts of DDoS attacks in 2017, security leaders have gotten a heads up about possible compromises through IoT devices. We certainly can expect a good amount of improved security features associated with IoT devices this year.

 

3) Biometric Authentication

Let’s face the truth! Usernames and Passwords suck! They are impersonal and put a burden on users in remembering them. With the introduction of fingerprint sensors on mobile phones and the huge success of Apple’s FaceID, we should expect more of biometric-enabled devices in the coming months. While it might be a little too early to expect biometric authentication in all our daily accounts, we might see a start of a new identity authentication evolution.

 

4) GDPR – General Data Protection Regulation (GDPR)

General Data Protection Regulation is probably something we haven’t heard till lately. GDPR is a set of regulations, expected to go into effect on May 25, 2018, that is intended to strengthen data protection for all individuals and businesses within the European Union. While its to early to predict anything, the GDPR is expected to have a significant influence on the digital sector of Europe.

 

5) Cyber attacks on global organizations

Mainframes are the backbone of most global organizations. These are the computers responsible for processing bulk data such as statistics, census, bank operations and ATM transactions. While security firms focus more on protecting mobile and computer systems, mainframes are being overlooked.

 

6) Cloud security

With the automotive industry recently joining the cloud family, providing users with state of the art navigation systems, it is predicted that there would be huge investments to secure the cloud environment. The priority would be to generate trust among cloud users to store data without hesitation on servers they don’t own.

 

7) Increase in Ransomware

Ransomware, as the name suggests, is a malicious virus where the victim’s access to information is blocked unless a ransom is paid. Typically, the ransom amount is in hundreds or thousands of dollars although sometimes even higher. Last year itself, there has been an increase of 36 percent of ransomware and the trend doesn’t seem to slow down. The Petya Ransomware that caused mayhem in almost all of Europe and other parts of the world in 2017 is a warning to expect more.

 

8) Cryptocurrencies and Blockchains

Cryptocurrencies have been an evolution. However, they do have certain drawbacks, especially when it comes to bitcoins. Since Bitcoin transactions do not require identity verification and can be done anonymously, they have fueled events of ransom threats like never before.

This is predicted to continue growing as we progress into 2018. Cryptocurrencies have been built around the concept of blockchains and this technology is just limited to them. While it is tough to predict what other implications blockchains might have on cybersecurity, some educated predictions say they could be used in decentralizing access control and improving identity management.

 

9) Threats to serverless apps

While serverless apps have some considerable advantages, they are potential threats to cyber-attacks, the reason being – the lack of servers. It might seem counter-intuitive at first as for the most part, the security of the serverless application is controlled by the customer itself. However, that isn’t always the best idea, as a users device might not always be the safest location to store important information.

 

10) Safer for everyone

2017 was a year when we experienced cyber attacks we have never seen before. Such events have pushed security experts to carry out careful investigations to make sure certain cybercrimes do not repeat. Governments and tech-firms have invested an immense amount of money to tackle a problem that caused more than $3 trillion of damages worldwide just last year. The increased amount of general awareness and the proper preparedness from various authorities should make the internet a much safer place for everyone.

Be the first to write a comment.

Leave a Reply

Apple, OS X

The Ultimate Guide to OS X Performance

Back in May 2007, I wrote a guide on 52 ways to speed up OS X, the article resonated with…

Back in May 2007, I wrote a guide on 52 ways to speed up OS X, the article resonated with many people about their frustrations with their Mac’s speed and gave 52 simple ways to improve performance. In the following months and years the article received almost half a million views* but over a decade later are the tips still relevant and what are the best methods to speed up an aging mac today?

1. General Troubleshooting

A good place to start is to investigate whether there is a specific application or process slowing down your Mac. For this we turn to the Activity Monitor, Apple already has a good article on getting to grips with the various features of their task manager. For our purposes of troubleshooting, we’re interested in any applications which are using the CPU for a long period of time.

Is Adobe Acrobat Reader DC taking an unreasonable amount of the CPU over a sustained period of time?

Trying to identify the process at fault is often difficult as there isn’t a comprehensive list of all the core OS X processes (like kernel_task, fontd, WindowServer, hidd, coreaudiod). Typically when troubleshooting if a process is taking a sustained period of time to load I will simply Google it to check whether its a core OS X process, an application or malware.

Once you’ve identified the process you can then decide whether you need it or whether you should look at how to remove it.

2. Hardware

In a lot of cases, nothing is going to beat newer or better hardware. Mac’s have always been poor when it comes to upgradability and newer Mac’s haven’t made this any easier. In many cases, the components your Mac come with are the ones it will end its life with however some models allow you to change either the hard drive or the memory.

OS X and our applications love memory and the rule is simple, the more the better, if you have the option to upgrade from 2gb to 4gb or 4gb to 8gb its one of the easiest ways to see a noticeable performance increase.

Older Macs before SSDs were standard should let you replace the hard drive for a solid state drive. There are plenty of tutorials on YouTube on how to do this. The performance difference is again noticeable and its a relatively low cost way to breath some life into an older Mac.

Other upgrades such as changing processors are usually not possible or recommended due to compatibility.

3. Disk Space

As well as the physical memory (RAM) in your Mac, OS X uses virtual memory, or part of your physical disk drive. This gets cleared out at reboot and is managed automatically by the system as you use it. If you’re like me and only reboot for updates then it’s not uncommon for these files to be several gigabytes. OS X manages these files without you having to worry but it is important to ensure you have enough space left on your drive.

OS X memory usage after reboot and opening Safari
The memory tab of Activity Monitor shows the biggest memory users and the types of memory in use.

Quick tips for more disk space

  1. Empty Trash
  2. Clear back download items
  3. Run a disk space analyser app such as Free Disk Space 
  4. Delete odd applications or files

4. OS X Tweaks

This section concentrates on quick and simple changes you can make within OS X to help with performance.

Start up items

When installing applications they often install themselves as a ‘login item’ so that when you boot your machine they open at login. In many circumstances, there is a good reason for this, applications such as Dropbox or OneDrive open in this way so that they can synchronise any files waiting to download or upload. In some cases though the functionality of the program isn’t needed on boot.

Fortunately, OS X gives a simple interface for reviewing these applications:

  1. Open System Preferences
  2. Click Users & Groups
  3. Click the tab ‘login items’
  4. From here you can see the items you have on startup.
  5. To remove an item click on it then click the minus symbol.

Visual effects

Disabling some of OS X’s visual effects will make it feel a little faster, to do the following you need to open the Terminal application (found in the applications folder) :

1. Disable animations when opening and closing windows.

defaults write NSGlobalDomain NSAutomaticWindowAnimationsEnabled -bool false

2. Disable animations when opening a Quick Look window.

defaults write -g QLPanelAnimationDuration -float 0

3. Accelerated playback when adjusting the window size (Cocoa applications).

defaults write NSGlobalDomain NSWindowResizeTime -float 0.001

4. Disable animation when opening the Info window in Finder (cmd⌘ + i).

defaults write com.apple.finder DisableAllAnimations -bool true

5. Disable animations when you open an application from the Dock.

defaults write com.apple.dock launchanim -bool false

6. Make all animations faster that are used by Mission Control.

defaults write com.apple.dock expose-animation-duration -float 0.1

7. Disable the delay when you hide the Dock

defaults write com.apple.Dock autohide-delay -float 0

Reduce Finder Memory Usage

When opening finder, by default, it’s set to search for files within All My Files view. With lots of files on older Mac’s, this can slow down the opening of Finder.

  1. Open Finder
  2. Choose Preferences in the top menu
  3. Locate New Finder Window menu
  4. Now you change the default settings from “All My Files” to other more specific location, like your Documents folder. Next time you launch Finder it will automatically open in this new location.

5. Applications

I clung up to using Adobe Fireworks for years, it did everything I needed when it came to graphics editing but on my early 2015 MacBook Pro, it took a full 27 seconds to load. The reason was the way the software was written, using software development languages and libraries common in the early days of OS X.

About a year ago I switched to Acorn a modern graphics editor written specifically for newer versions of OS X, it loads on my Mac in about 2 seconds.

I hadn’t changed anything to improve performance as such but just by changing the application I had made my Mac feel significantly quicker.

There’s no hard and fast rules when it comes to finding faster applications but if there is a common application you use which is either slow to load or to use then try searching for an alternative.

In general applications made specifically for OS X (such as my example above) are quicker.

Application Updates

Updates are a tricky one when it comes to performance, for many software developers performance related improvements will come in incremental releases after the main product has shipped. However, as we reported on earlier in the year with the Meltdown/Spectre exploits any related updates could have crippling performance issues.

On the other hand, Apple has released entire versions of OSX (remember OS X 10.6 Snow Leopard and to a lesser extent OS X 10.13 High Sierra) to give performance improvements.

In general, updates function as security fixes and bug fixes rather than performance improvements.

6. Web Browsers

Clear Cache

  • Safari. Launch the browser and select ‘Safari’ from the menu bar, followed by ‘Preferences…’ In the window that appears, click the ‘Privacy’ tab and give the ‘Manage Website Data…’ button a click. Select ‘Remove All.’
  • Chrome. Launch Chrome and select ‘History’ from the menu bar, followed by ‘Show full history.’ Click the ‘Clear browsing data…’ button.

 

Browser Extensions

How to remove Safari extensions

  1. Launch Safari.
  2. Click Safari > Preferences in the upper menu
  3. Choose Extensions tab.
  4. Remove the extensions you don’t need

How to remove Chrome extensions

  1. Launch Chrome.
  2. Click a three-dot icon in the top-right corner.
  3. Click More tools > Extensions.
  4. This will show you all the extensions you have installed. Simply delete or disable any you no longer use or recognise.

8. Other Troubleshooting

Resetting the SMC

Resetting the SMC can fix a number of power and hardware related problems including:

  • Problems with cooling fans: Such as your the fans run at high speeds for long periods of time or your fans not working at all
  • Lighting issues: Such as your battery indicator lights not working, problems with display backlighting or keyboard backlights issues.
  • Power management issues: Such as your Mac not turning on, sleep not working, random shutdowns and reboots.
  • Battery problems: Such as your battery not charging.
  • General performance and functionality issues: Such as your Mac feeling abnormally slow despite no CPU or disk usage or if your external ports are not working, airport and Bluetooth not working.

To reset on Mac desktops:

  1. Shut down your Mac.
  2. Unplug the power cord.
  3. Wait at least 15 seconds.
  4. Plug the power cord back in.
  5. Wait 5 seconds, then press the power button again to turn on your Mac.

To reset on Mac laptops:

  1. Shut down your Mac.
  2. Press Shift-Control-Option on the left side of the built-in keyboard, then press the power button at the same time. Hold these keys and the power button for 10 seconds.
    If you have a MacBook Pro with Touch ID, the Touch ID button is also the power button.
  3. Release all keys.
  4. Press the power button again to turn on your Mac.

9. Good Practice

These tips aren’t necessarily going to speed OS X up but will make the day to day usage of your Mac easier and hence feel quicker to use.

Keeping the downloads folder clean

Since the introduction of High Sierra, when you’ve downloaded a new installation file, you will be prompted to send the file to the trash. This doesn’t apply to other files such as PDFs and images so its good practice to clear back this folder once in a while.

Removing Unused Apps

In most cases removing an unused app is as simple as locating it in finder and dragging it to the trash.

10. Final Note

Hopefully, the above tips will help keep your Mac feeling fast and current and remember to try to restart once in a while!

*Google analytics – 492,193 page views as of 6th March 2018

Continue Reading
Internet Security, Social Media

8 Tips to Protect Your Browsing Privacy

Online privacy is a hot topic recently with the influx of news stories about Facebook and Cambridge Analytica possibly misusing…

Online privacy is a hot topic recently with the influx of news stories about Facebook and Cambridge Analytica possibly misusing users data. Although the news stories are highlighting to people just how much Facebook knows about them, they are not the only company that keeps track of things you do online!

Virtually every interaction that takes place in a web browser is tracked in some way. There are many ways in which you are tracked online, IP address, browser cookies, HTTP referrer headers, browser fingerprints and user agents. All of these things make it possible to trace everything you do online.

Unfortunately, the majority of people are happy to hand out way too much information about themselves too – their location, their relationships and much more online.

For some users, browsing privacy is only just becoming a priority when they are online. Fortunately, we have compiled some tips, add-ons/browser extensions to try and minimize the amount of information available about you and your browsing habits.

 

Stop oversharing – Take your browsing privacy seriously

 

Our first and most obvious tip, stop oversharing your information online willingly! Whenever you disclose information online it is there forever. Whether this is on facebook, twitter or other social media try to simply not share information that is not relevant.

Simply customizing your social media settings to restrict who can see what you share is a good starting place.

Turning off location tracking in apps and your google account settings should be your next step.

Unfortunately, information shared willingly only scratches the surface of data that is stored about you online.

 

“Do Not Track”

 

All modern web browsers have the ability to toggle on a “do not track” option. This option is a W3C standard that tells websites, when enabled, to stop their user-tracking and disable cross-site user tracking.

An example of this would be targeted adverts. If you have ever been browsing for an item, an electric toothbrush, for example, you may have noticed that for weeks after you see lots of adverts or more electric toothbrushes. This example would not happen if a user had the “do not track” option enabled in their browser.

 

Ad Blockers

 

To avoid seeing adverts and many user tracking scripts at all you can simply install an ad blocker. There are many options available to you, common and powerful choices are Ad Block Plus (https://adblockplus.org/) and uBlock Origin (https://github.com/gorhill/uBlock).

 

Disable browser scripts

 

A slightly more aggressive way of blocking user tracking scripts is to install a browser add-on/extension that disables them all by default. No Script (https://noscript.net/) and ScriptSafe (https://www.andryou.com/scriptsafe/) are the most common options available.

By default, these extensions will block all Java, JavaScript, Flash and other tracking scripts generated by the site you are visiting. This “white list” approach can break some website until you enable certain scripts but it does give you the freedom and security of having everything off by default.

 

Become an online ghost with Ghostery – https://www.ghostery.com

 

Ghostery is a browser extensions/add-on that provides a safer way to browse online. It offers a wide range of features such as enhanced ad-blocking, enhanced anti-tracking, and smart blocking. By default, it blocks thousands of known user tracking scripts. Ghostery offers control over your browsing privacy by allowing you to run individual tracking scripts if for some reason you need them.

 

HTTPS Everywhere – https://www.eff.org/https-everywhere

 

HTTPS Everywhere is another browser extension/add-on that encrypts your data sent to many major websites.

Although most communication to websites nowadays is done through HTTPS, some information you send may sneak through in an unsecured, un-encrypted form. This is where HTTPS Everywhere steps in – It steps in and takes these unsecured HTTP requests and encrypts them.

 

Mozilla Facebook container – https://addons.mozilla.org/en-US/firefox/addon/facebook-container/

 

Following on from recent news stories, the Mozilla foundation has launched their Facebook container. When installed it will delete all of your previous Facebook cookies and ask you to log in using the container tab. It acts like a normal browser tab but with one important difference – Any Facebook activities are isolated from other browser activity.

Any websites with embedded Facebook widgets, such as like or share buttons will not work as your account login is contained inside the Facebook container tab. This makes it so that Facebook loses the ability to track your browsing activity outside of Facebook. A simple yet efficient way of restoring some browsing privacy to your daily Facebook session!

 

VPN (Virtual Private Network)

 

In one of our previous articles – Do I need a VPN for 2018 We discussed the pros of a VPN for the average user. The main point that we took from the article was that by having a VPN you are ensuring that all your online browsing information is invisible to your ISP.

A VPN will stop your ISP spying on your online browsing activities but is not a golden bullet to online browsing privacy. Using a (reputable!) VPN in conjunction with some of the add-ons/extensions mentioned in this article would be a very powerful combination to stay safe online.

 

 

Continue Reading
Android, Antivirus, Apple, Chromebook, Enterprise, Internet Security, Microsoft, Mobile, OS X, Windows

Is Buying Antivirus Software Necessary?

Let’s address the elephant in the room – malware and viruses do exist! Devices are not immune so we have…

Let’s address the elephant in the room – malware and viruses do exist! Devices are not immune so we have to ask “Is Buying Antivirus Software Necessary?”! It is worth noting that if your phone, tablet or computer is invulnerable to internet threats today, it isn’t a guarantee it will stay so forever.

Having said that, let’s discuss why viruses are immensely prevalent on some platforms while on others they are almost non-existent.

First and foremost, we need to understand that cybercrime is a lucrative business. Hackers are always in search of ways to sneak in into users’ systems and capitalize on sensitive information.

While most vulnerabilities till now have been centered around the Windows OS, other system software like that of Apple’s isn’t as protected either as it once used to be.

It’s not that there are issues with Apple’s inbuilt security system, but rather, cyber culprits have found new ways of slipping through advanced defense systems. The reason why they have started out so late is that they were pretty content targeting the much easier and larger number of Windows and Android users till now.

Though Apple’s security is pretty impressive, it isn’t completely immune. For cybercriminals exploiting the system, it is just a matter of time.

As of now, Apple doesn’t really have antivirus software for the iOS and the same goes for Google’s Chrome OS, one of the most secure systems to date.

The few apps that claim to protect devices running on these operating systems are probably Security Software. So, for the time being, we will focus our attention on Windows, OS X, and Android systems.

 

Windows PCs and Laptops

 

Before progressing any further, let’s answer the simpler stuff first – Is buying antivirus software necessary for windows 7 or older?

The answer is simple and straightforward – YES, IT IS!

Now back to what’s more popular: What about Windows 8 and Windows 10?

While Windows 8 and above have had some significant improvements in their security system, especially after the introduction of Windows 10 with which Windows Defender Antivirus (a step-up to the Microsoft Security Essentials) comes included, the everlasting question whether one needs an additional antivirus software or not still remains unanswered.

Before passing any judgment, it must be noted that Windows Defender switches off gracefully once it detects a third-party program to avoid any interference. Hence, you once an antivirus software is installed and running the Windows Defender isn’t going to work any longer. Unless you are confident with your antivirus software, it is best letting Microsoft’s default defender do the job.

While Windows Defender if good, it certainly isn’t the best! According to AV-TEST, Microsoft’s inbuilt security program score a 4.5 out of 6. Of course, it isn’t bad but not as capable as Avira’s or Avast’s antivirus software that topped the list in December 2017.

 

Mac OS X Desktop Computers and Laptops

 

For a long time, Mac OS X was incredibly safe. Apple’s intelligently designed sandbox OS made it extremely difficult for criminals to hack Apple devices.

As a matter of fact, if a few years ago a Mac user would install an antivirus software, the only purpose it would solve was preventing it from passing to other devices on the same network. However, Macs have been cracked and have lately been more vulnerable to threats like never before.

For now, home users are pretty safe from being affected by a malware or a virus. Even though not many Mac users have been affected by a virus, it wouldn’t be right to forget that the risks are there.

To be on the safer side, it wouldn’t be a bad idea investing in an antivirus. Just like for the Windows, antivirus software from Kaspersky, Symantec and Avast do an impressive job of protecting Apple devices.

 

Android Phones and Tablets

 

It wouldn’t be safe to say that Android viruses do not exist at all. However, as long as one refrains from downloading apps from external sources, it is almost impossible your device to be infected by a virus or malware.

While, by default, Google doesn’t allow its Android users to installs apps from third-party source, this can be easily modified through a few steps in the settings. If you regularly install apps from unknown sources or are one of those courageous users who fiddle with their devices by gaining root access, having an antivirus installed wouldn’t be a bad idea.

It must be noted, that the Android threats known till now aren’t as malicious as the ones affecting Windows PCs and Laptops. This is mainly because it isn’t as easy to exploit an Android device and there isn’t much reason to do so as most of the sensitive information that hackers are in the hunt for is one computer.

As of now, there hasn’t been an Android malware that has caused booting issues for a device. Even if one feels his Android phone or tablet has been affected by a virus, all he has to do is back up his data and run a factory reset.

While having an antivirus might seem something optional, one might not regret having a security software instead installed on his Android.

What is important to keep in mind is that Android runs on devices that have a tendency to get stolen. Losing a phone or a tablet is quite daunting indeed. But giving away sensitive information is even worse. And, that is where security software plays a crucial role.

 

Is Buying Antivirus Software Necessary or will a free version suffice?

 

While free antivirus software today, like the Sophos Antivirus, protect devices from threats to a good degree, they are obviously nowhere near to what the paid ones are capable of doing.

Whether or not to pay for an antivirus or whether even having one is required is a highly personal opinion and there are certain things that are to be considered while making such a decision. If of course, you have important data on your device, something you cannot afford lose an inexpensive antivirus is worth adding to the expense.

For some suggestions on which antivirus to pick, check our article – Top 5 Antivirus programs for 2018

Continue Reading
Crypto Currency

The Top 10 Tools for Managing your Crypto Wallet

Buying and Selling Cryptocurrency is relatively straightforward, there are a huge number of guides available online which make the process…

Buying and Selling Cryptocurrency is relatively straightforward, there are a huge number of guides available online which make the process very clear. However, storing and managing your crypto wallet can be a lot more confusing.

Whilst Crypto is stored in a wallet, there are many different types of wallet available all with different features and levels of functionality.

The vast majority of holders of Crypto use ‘hot’ wallets which are software programs which are connected to the internet at all times. They are the most readily available and the easiest to set up. This is especially true of those new to the Crypto market.

This article aims to provide the majority with some insight into the top tools available to help manage Cryptocurrency.

Here we go!

Increase Security

One of the most useful tools for managing your Crypto, especially if you are new to the market is a ‘cold’ wallet, one that it is not connected to the internet.

Currently, the most widely used and tested ones are –

Ledger Nano S

This is a smooth, strong, safe and affordable hardware wallet and one of the most competitively priced. Widely used, it is a multicurrency wallet integrated into a smartcard device.

It is very light and easy to use. To use it you simply connect it to a USB port and you are ready to go. It works on any computer, regardless of the operating system.

TREZOR

One of the best-known hardware wallets. It supports the major Cryptos so would work well as a Bitcoin Wallet or an Ethereum Wallet. There is full support for Windows (version 7 and higher), OS X (version 10.8 and higher) and Linux.

You can also use your TREZOR with Android devices which have USB On-The-Go. Trezor is considered to be one of the most secure ‘cold’ Crypto wallets available on the market today with complex security.

KeepKey

KeepKey works with the wallet software on your computer by taking over the management of private key generation, private key storage, and transaction signing. KeepKey generates a private key using its hardware-based random number generator, combined with randomness provided by your computer.

Once your private key is generated, you are given the one-time opportunity to write down a backup of your KeepKey in the form of a twelve-word recovery sentence. This is one of the simplest wallets to use an is widely available in major online retailers.

Archos

This well established French company with many years’ experience also recently launched a hardware wallet. Many of the features to be found on popular hardware wallets such as the Ledger Nano are replicated here, including the ability to generate a private key and support for a range of currencies.

Bitcoin, bitcoin cash, ethereum, litecoin, and zcash will all be supported, with more to be added. The device can also be used to add an additional layer of security to other third-party wallets.

Manage Your Portfolio

CryptoCompare

If you are one of the many people that hold Crypto across multiple wallets, then this may be the tool for you.

This is an excellent mobile app that aims to assist you to manage your portfolio of Cryptos across multiple wallets. With this app, you not only enter what your holdings are but where they are stored. This may seem like an unusual feature but, it is an excellent one.

It allows you to monitor how much Crypto you have stored in ‘hot’ wallets giving you the opportunity to move them into a ‘cold’ wallet for greater security. This can be an important thing to monitor given how rapidly Crypto values can change.

CoinTracker

This is a platform which you can also use to track your crypto across all exchanges and wallets. CoinTracker automates this process. You start by connecting it to every exchange you use (once it’s supported by the software) and can also add the public address to any wallet that holds Bitcoin, Ethereum, Litecoin, and Dogecoin.

It will automatically read the balance and update it in your portfolio. A useful tool to manage your Bitcoin wallet and Ethereum wallet in particular as these can contain very high values depending on when you entered the market!

Increase Trading Speed

SikurPhone

If you use a ‘cold’ wallet then you are aware of the disadvantages. You may not have it with you when markets change especially when you want to dispose of some Crypto quickly, or even buy more. The potential solution here is SikurPhone.

This is a very high security mobile phone with a built in Cryptocurrency wallet which can be used as a Bitcoin wallet or Ethereum wallet for example.

Don’t get caught out by the markets through your use of a ‘cold’ wallet. Take your wallet with you in this device which also functions as a mobile phone. Far more natural to carry around with you than bringing another hardware wallet that you need a computer to use!

Eidoo

Again this app adds functionality to the traditional wallet and increases trading speed. The app works by creating a mobile app that serves as a multicurrency digital wallet for Bitcoin, Ethereum, and all ERC20 tokens.

Additionally, Eidoo functions as a hybrid exchange, allowing users to sell, buy, spend and convert cryptocurrencies on one platform.

Once users download the Eidoo mobile app, they can secure all their multi-asset accounts and addresses, as well as their signing keys. Eidoo simplifies and protects wallets by allowing users to access their cryptocurrencies in one place with one password, which is comprised of 12 words.

In case of emergency, Eidoo also offers a “recovery tool” designed to provide users with their tokens in a simple manner.

A very cool app and an interesting one to watch from this Swiss start up.

Reduce the number of wallets you need

Whilst you can increase trading speed and security one of the best tools to use is a multicurrency wallet that reduces the number of wallets you need to hold. You can try these two to start.

Exodus

Exodus is designed for people who have never used an exchange. It is really simple to use and particularly good for those trading Bitcoin or Ethereum.

Exodus currently supports Bitcoin, Bitcoin Cash, Bitcoin Gold, Dash, Ethereum, Ethereum Classic, Litecoin and unusually Decred.

Jaxx

Very popular Jaxx was first developed in 2014 and serves not only as a Bitcoin wallet but an app which can store multiple cryptocurrencies such as Litecoin, Dash, Ethereum and Bitcoin Cash.

Ripple is not currently supported but the Jaxx team have hinted they may support this feature in the future.

 

That’s it!

Clearly, there are a huge number of tools out there to help you to manage your Cryptocurrency wallet. Hopefully, this article has given you a good place to start!

 

 

Continue Reading