Watch this webinar as Ben talks to security experts and Traced Partners, Spear Shield, and learn about Cyber Essentials and BYOD, and how Mobile Threat Defence makes compliance easy.
Malibot is hoovering up logins and MFA codes, sending financial data and screen captures back to the attackers – and more.
MitMs are difficult to spot because they don’t happen on your phone. Instead, the attacker inserts themselves between you and the system your phone tries to contact.
We’re pleased to announce the launch of Personal Privacy Mode – an optional setting that returns only the compliance state of the device, and nothing else.
These WhatsApp status trackers are a new variety of surveillance software, but can be just as invasive and harmful as stalkerware.
The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals.
Annoying pop-ups on your phone? Scam texts? Phone acting strangely? If so, it may be that one of your apps is working against you.
If you access company info on your phone, you need think about GDPR. Every device needs to be protected.
You might spot a phishing email on your computer, but it’s much harder on your phone. Why is mobile phishing so successful, and how can you protect yourself?
A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defence protects your remote workforce from data theft and loss