Foreground: A person is seated at a desk working on a computer. Multiple digital content panels float above the desk—icons for text (“Aa”), video, images, and documents—suggesting blogging, content creation, or digital media management.

Left side: A large stylized padlock and network grid symbolize cybersecurity, protection, and secure technology.

Top-left corner: A logo reading “SURVIVE TECHNOLOGY”, reinforcing a tech-focused brand identity.

Top-center text box: A blog introduction explaining that the site shares experiences, reviews of products and services, and topics related to cybersecurity and technology, emphasizing learning and new perspectives.

Top-right: A small label reading “Blog.”

Color palette: Warm coral/orange background with cool blue and purple accents, giving a professional yet approachable feel.

Style: Clean vector illustration, minimalistic, no photorealism—typical of tech blogs, landing pages, or explainer graphics.

These Aren’t The Droid (Apps) You’re Looking For

One security flaw that comes to mind on Android phones is the ability to download phony apps from the Play Store or other websites. Apps make our lives easier by saving time and making connectivity more convenient. Whether it be the cost of the device, features of a phone, or the Google system itself. 1/3 of the US population makes Android devices their primary operating system. With over 2.5 million apps available to download, no wonder it can be easy to download a harmful app accidentally. Dr.Web reported that in December of 2022, trojans and spyware had increased. Though Google has been doing a better job removing these bad apps, some may go under the radar. This post will help you determine how to find out if an Android app is harmful before downloading and the best approach to evaluate those apps. Read More…