Categories
cybersecurity Industries

Legal Firms

In the first half of 2020, law firms reported to the SRA that nearly £2.5m of money held had been stolen by cybercriminals.

Categories
cybersecurity

MTD or MDM – Which Do You Need?

If you’ve already got MDM, can you justify also having MTD?

Categories
cybersecurity Phishing Scams

Beware text message scams

In April, Android users were attacked by a new viral threat that swept the UK and infected phones by the thousand. Called FluBot, it spread by sending phishing messages via SMS texts.

Categories
cybersecurity Support

Threat hunting on mobile – why the signing certificate is important

It’s a problem in the industry that infuriates me – large cybersecurity companies apply the same threat model to all platforms.

Categories
cybersecurity Support

Threat hunting on Android with Traced Control

For those who want to dig a little deeper into their organisation’s mobile threats, Traced CTO Matt Boddy demonstrates hunting for the Cerberus banking Trojan, using Traced Control.

Categories
cybersecurity Scams

How a fake Netflix app stole WhatsApp messages and spread malware

FlixOnline offered two months’ free Netflix access for free, but it was fake app harbouring malware that takes control of the victim’s Android phone.

Categories
cybersecurity

[Infographic] GDPR and the importance of mobile security for businesses

This infographic breaks down mobile security for businesses and explains how and why it is a key player in GDPR compliance.

Categories
cybersecurity Industries

Financial Services

Your phones a hot target for phishing attacks and data theft, and the front line in guarding against FCA and GDPR violations.

Categories
cybersecurity Phishing privacy spyware stalkerware

6 reasons why cybercriminals want to target your smartphone

The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals.

Categories
cybersecurity Scams

Combatting BEC: Advice From the World’s Most Famous Conman

It takes a thief to catch a thief, they say. So what can a thief teach us about BEC (Business Email Compromise), one of the most difficult to combat forms of computer theft?