Categories
cybersecurity Partners privacy Support

Introducing Traced’s Personal Privacy Mode

We’re pleased to announce the launch of Personal Privacy Mode – an optional setting that returns only the compliance state of the device, and nothing else.

Categories
privacy stalkerware

How a WhatsApp status loophole is aiding cyberstalkers

These WhatsApp status trackers are a new variety of surveillance software, but can be just as invasive and harmful as stalkerware.

Categories
cybersecurity Phishing privacy spyware stalkerware

6 reasons why cybercriminals want to target your smartphone

The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals.

Categories
cybersecurity privacy Scams spyware

It’s not you, it’s them: Break up with bad apps

Annoying pop-ups on your phone? Scam texts? Phone acting strangely? If so, it may be that one of your apps is working against you.

Categories
cybersecurity privacy

Mobile Security and GDPR

If you access company info on your phone, you need think about GDPR. Every device needs to be protected.

Categories
cybersecurity Phishing privacy

Why you should stay on guard against mobile phishers

You might spot a phishing email on your computer, but it’s much harder on your phone. Why is mobile phishing so successful, and how can you protect yourself?

Categories
cybersecurity Phishing privacy spyware

Are employee phones leaking your customer data?

A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defense protects your remote workforce from data theft and loss?

Categories
cybersecurity privacy

Android messaging app exposed private photos, audio and videos

Go SMS Pro has over 100m downloads and a 4.5 star rating, but the developers are playing fast and loose with users’ privacy.

Categories
cybersecurity privacy stalkerware

Discussing mobile threats on Tech Talks Daily

Matt Boddy chats with Neil C Hughes on his Tech Talks Daily podcast about mobile threats, the difficulty security vendors have and what makes Traced groundbreaking.

Categories
cybersecurity privacy

Are you being hacked through WiFi networks?

Criminals can use WiFi to scoop up personal information and drop malware on your devices. Here’s why WiFi protection is your first line of mobile threat defence.