It’s a problem in the industry that infuriates me – large cybersecurity companies apply the same threat model to all platforms.
Author: Matt Boddy
For those who want to dig a little deeper into their organisation’s mobile threats, Traced CTO Matt Boddy demonstrates hunting for the Cerberus banking Trojan, using Traced Control.
The human-actionable defences against phishing that we take for granted on a desktop aren’t available on a mobile.
FlixOnline offered two months’ free Netflix access for free, but it was fake app harbouring malware that takes control of the victim’s Android phone.
It takes a thief to catch a thief, they say. So what can a thief teach us about BEC (Business Email Compromise), one of the most difficult to combat forms of computer theft?
Would you pay £179.99 for Android wallpaper? No, no you wouldn’t.
You might spot a phishing email on your computer, but it’s much harder on your phone. Why is mobile phishing so successful, and how can you protect yourself?
Our mobile numbers are often in the public domain, so here’s what you need to know to avoid scams and phishing.
Trustd is purpose-built to protect you from apps that spy on you, known as stalkerware.
A bug in Firefox has exposed a little known fact about what apps can do behind your back.