More Than Mobile Sweepstakes — Win a Samsung Galaxy Tab 10.1

This sweepstakes is now closed. Please ‘like’ our Facebook page for updates on more F-Secure news and promotions.

Congratulations to our winner, Earl.

For years, analysts predicted that all of our devices — PCs, laptops, DVD players, mobile phones — would merge into one all-purpose device that would handle everything we do digitally. Surprisingly we are seeing more and more that people are actually travelling with up to three devices — a phone, a tablet and a laptop. All three perform similar functions but provide vastly different experiences.

We’ve discussed the proper way to secure all your devices. So now we have a question for you: For mobile connections, do you use a tablet a mobile phone or both?

By answering this question in the comments below, you’ll be entered to win a Samsung Galaxy Tab 10.1 with F-Secure Mobile Security.

Just read the rules and post your answer in the comments below.

BONUS ENTRY: Want an extra chance to win? Click here and take our quick mobile survey then post the comment “SURVEY COMPLETED” in an ADDITIONAL comment below.

Thanks for your time,

Anna

CC image by 3 Sverige

F-Secure Internet Security 2012
MORE THAN MOBILE SWEEPSTAKES – COMPETITION RULES AND PRIZES

By entering the Safer Shopping Sweepstakes promotion you accept the Official Competition Rules and the Privacy Policy (http://www.f-secure.com/en_US/privacy.html).

If you do not accept these rules, please do not enter this promotion.

1. The sponsor of this promotion is F-Secure Corporation, located at Tammasaarenkatu 7, Po. Box 24, 00181 Helsinki, Finland (“Sponsor”).
2. The promotion will begin at 12:00 PM PDT on April 3 , 2012 and end at 12:00 PM PDT April 19, 2012.
3. This promotion is void where prohibited or restricted by law. No purchase is necessary to enter.
4. 2 prizes — Samsung Galaxy 10.1 16 GB with a retail value of $449.99 and 1 F-Secure Mobile Security with a retail value of $39.99 — will be given as prizes in this promotion at the close of the competition.
5. Only two (2) entries per person per Sweepstakes will be accepted. Each comment posted constitutes an entry. Further attempts made by the same person and entries generated by a script, computer programs, macro, programmed, robotic or other automated means will be disqualified.
6. The winner will be chosen randomly from the people who participated in the competition by commenting on the “More Than Mobile Sweepstakes” page. Sponsor will notify the winner via email. If the winner does not respond within seven (7) days, he or she will forfeit the prize and another winner will be randomly chosen. This prize is shipped to the winner within 45 days of the making successful contact with the winner.
7. The winners are responsible for any taxes associated with receipt of the prizes. Sponsor reserves the right to substitute the prizes with other prizes of equal or greater value if the prize is not available for any reason.
8. Odds of winning the prizes depend upon the total number of eligible entries received.
9. No purchase or software download is necessary to enter or win. Purchase or software download will not increase your chances of winning.
10. To enter, visit http://safeandsavvy.f-secure.com/2012/04/03/more-than-mobile-sweepstakes/ and comment on the post up to two times. To comment you must provide your email address, which will not be made public. Entries are the property of Sponsor and will not be acknowledged or returned. Comments made be edited by F-Secure without explanation. We are not responsible for the content posted or linked.
11. Any entrant who attempts to cheat or tamper with the More Than Mobile Sweepstakes shall be disqualified by the Sponsor’s sole discretion.
12. The name of the winner will be announced via the F-Secure Twitter channel http://twitter.com/FSecure, F-Secure Facebook page http://www.facebook.com/FSecure and F-Secure’s Safe and Savvy blog http://safeandsavvy.f-secure.com/ once the winner has been contacted. By entering, the entrant agrees that his/her name, country and/or picture can be published at F-Secure’s aforementioned channels if he/she wins.
13. By entering, entrants agree to release and hold harmless Sponsor and all of its representatives from and against any and all costs, expenses, claims, demands, proceedings, suits, actions and/or liabilities for any injuries, death, loss or damage of any kind arising from or in connection with i) the distribution of any prize, ii) entrants’ participation in and/or entry into the campaign, acceptance or use of any prize or unavailability of any prize. Prizes are provided “AS IS” without warranty of any kind from the sponsor.
14. Employees of Sponsor and family members of such employees are not eligible to enter.

© 2011 F-SECURE CORPORATION. ALL RIGHTS RESERVED.

Canon PowerShot SX130 IS

More posts from this topic

Unbenannt-2

Why your Apple Watch will probably never be infected by malware

On Tuesday Apple announced its latest iPhone models and a new piece of wearable technology some have been anxiously waiting for -- Apple Watch. TechRadar describes the latest innovation from Cupertino as "An iOS 8-friendly watch that plays nice with your iPhone." And if it works like your iPhone, you can expect that it will free of all mobile malware threats, unless you decide to "jailbreak" it. The latest F-Secure Labs Threat Report clears up one big misconception about iOS malware: It does exist, barely. In the first half of 2014, 295 new families and variants or mobile malware were discovered – 294 on Android and one on iOS.  iPhone users can face phishing scams and Wi-Fi hijacking, which is why we created our Freedome VPN, but the threat of getting a bad app on your iOS device is almost non-existent. "Unlike Android, malware on iOS have so far only been effective against jailbroken devices, making the jailbreak tools created by various hacker outfits (and which usually work by exploiting undocumented bugs in the platform) of interest to security researchers," the report explains. The iOS threat that was found earlier this year, Unflod Baby Panda, was designed to listen to outgoing SSL connections in order to steal the device’s Apple ID and password details. Apple ID and passwords have been in the news recently as they may have played a role in a series of hacks of celebrity iCloud accounts that led to the posting of dozens of private photos. Our Mikko Hypponen explained in our latest Threat Report Webinar that many users have been using these accounts for years, mostly to purchase items in the iTunes store, without realizing how much data they were actually protecting. But Unflod Baby Panda is very unlikely to have played any role in the celebrity hacks, as "jailbreaking" a device is still very rare. Few users know about the hack that gives up the protection of the "closed garden" approach of the iOS app store, which has been incredibly successful in keeping malware off the platform, especially compared to the more open Android landscape. The official Play store has seen some infiltration by bad apps, adware and spamware -- as has the iOS app store to a far lesser degree -- but the majority of Android threats come from third-party marketplaces, which is why F-Secure Labs recommends you avoid them. The vast majority of iPhone owners have never had to worry about malware -- and if the Apple Watch employs the some tight restrictions on apps, the device will likely be free of security concerns. However, having a watch with the power of a smartphone attached to your body nearly twenty-four hours a day promises to introduce privacy questions few have ever considered.    

Sep 9, 2014
BY Jason
Unbenannt-4
Aug 28, 2014
BY Jason