Categories
cybersecurity

Demystifying Mobile Security

What is MDM? What is MTD? Or EMM? Your one-stop guide to mobile security acronyms and how the solutions fit together

Categories
Support

[Video] Detecting Attackers on WiFi Networks

In this short video, Ben demonstrates a MitM attack via a local coffee shop WiFi.

Categories
Support

[Video] Set Up Traced Control and Enrol Your First Device

See how easy it is to create an account with Traced Control, our groundbreaking Mobile Threat Defense console.

Categories
Uncategorized

Are Employee Phones Leaking Your Customer Data?

A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defense protects your remote workforce from data theft and loss?

Categories
cybersecurity privacy stalkerware

Discussing mobile threats on Tech Talks Daily

Matt Boddy chats with Neil C Hughes on his Tech Talks Daily podcast about mobile threats, the difficulty security vendors have and what makes Traced groundbreaking.

Categories
privacy

WhatsApp with these disappearing messages?

WhatsApp’s offering is definitely not the same as that provided by Signal, Telegram or even Snapchat. Here’s why.

Categories
cybersecurity

Further £300k investment for Traced

Investment will support the launch of Traced’s B2B security solution, addressing the growth and digital vulnerability in the new normal of remote-working.

Categories
stalkerware

Video: Understanding Stalkerware

We spoke to Chloé Messdaghi from Point3 Security, about what it is, who uses it, and what you should do if you’re being spied on via your phone

Categories
stalkerware

How does stalkerware get on your phone?

Here are the four main ways a stalker can put stalkerware on your phone or monitor what you’re doing.

Categories
stalkerware

How to find and remove stalkerware on Android

Do you think someone might be spying on your Android phone? How to detect and remove stalkerware from your device.