Categories
cybersecurity

Demystifying Mobile Security

What is MDM? What is MTD? Or EMM? Your one-stop guide to mobile security acronyms and how the solutions fit together

Categories
cybersecurity privacy

Android messaging app exposed private photos, audio and videos

Go SMS Pro has over 100m downloads and a 4.5 star rating, but the developers are playing fast and loose with users’ privacy.

Categories
cybersecurity privacy stalkerware

Discussing mobile threats on Tech Talks Daily

Matt Boddy chats with Neil C Hughes on his Tech Talks Daily podcast about mobile threats, the difficulty security vendors have and what makes Traced groundbreaking.

Categories
cybersecurity privacy

Are you being hacked through WiFi networks?

Criminals can use WiFi to scoop up personal information and drop malware on your devices. Here’s why WiFi protection is your first line of mobile threat defence.

Categories
cybersecurity privacy

What scammers can do with just a phone number

Our mobile numbers are often in the public domain, so here’s what you need to know to avoid scams and phishing.

Categories
cybersecurity

Further £300k investment for Traced

Investment will support the launch of Traced’s B2B security solution, addressing the growth and digital vulnerability in the new normal of remote-working.

Categories
cybersecurity stalkerware

Using Traced to stay protected from stalkerware

Traced is purpose-built to protect you from apps that spy on you, known as stalkerware.

Categories
cybersecurity

How websites can use your camera when your phone is locked

A bug in Firefox has exposed a little known fact about what apps can do behind your back.

Categories
cybersecurity

Android Incident Response Lab 3

Introduction During this lab we tie together techniques used in Lab 1 and Lab 2 to identify a malicious app sitting on our device along with the information it could have obtained access to. Following this, we move onto stage 3 of incident response, the containment phase to remove this malicious app from our device. […]

Categories
cybersecurity

Protected: traced CTF Submission

There is no excerpt because this is a protected post.