Categories
cybersecurity privacy

Webinar: How to solve BYOD for Cyber Essentials

Watch this webinar as Ben talks to security experts and Traced Partners, Spear Shield, and learn about Cyber Essentials and BYOD, and how Mobile Threat Defence makes compliance easy.

Categories
cybersecurity Phishing privacy spyware

Malibot malware can steal everything from your phone – protect your Android device

Malibot is hoovering up logins and MFA codes, sending financial data and screen captures back to the attackers – and more.

Categories
cybersecurity Partners privacy

MitM Attacks: How to Avoid the Mobile Piggy in the Middle

MitMs are difficult to spot because they don’t happen on your phone. Instead, the attacker inserts themselves between you and the system your phone tries to contact.

Categories
cybersecurity Partners privacy Support

Introducing Personal Privacy Mode

We’re pleased to announce the launch of Personal Privacy Mode – an optional setting that returns only the compliance state of the device, and nothing else.

Categories
privacy stalkerware

How a WhatsApp status loophole is aiding cyberstalkers

These WhatsApp status trackers are a new variety of surveillance software, but can be just as invasive and harmful as stalkerware.

Categories
cybersecurity Phishing privacy spyware stalkerware

6 reasons why cybercriminals want to target your smartphone

The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals.

Categories
cybersecurity privacy Scams spyware

It’s not you, it’s them: Break up with bad apps

Annoying pop-ups on your phone? Scam texts? Phone acting strangely? If so, it may be that one of your apps is working against you.

Categories
cybersecurity privacy

Mobile Security and GDPR

If you access company info on your phone, you need think about GDPR. Every device needs to be protected.

Categories
cybersecurity Phishing privacy

Why you should stay on guard against mobile phishers

You might spot a phishing email on your computer, but it’s much harder on your phone. Why is mobile phishing so successful, and how can you protect yourself?

Categories
cybersecurity Phishing privacy spyware

Are employee phones leaking your customer data?

A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defence protects your remote workforce from data theft and loss