Categories
Support

Main features of the Traced App

A summary of the main features of the Android and iOS Traced apps.

Categories
cybersecurity Support

Threat hunting on mobile – why the signing certificate is important

It’s a problem in the industry that infuriates me – large cybersecurity companies apply the same threat model to all platforms.

Categories
cybersecurity Support

Threat hunting on Android with Traced Control

For those who want to dig a little deeper into their organisation’s mobile threats, Traced CTO Matt Boddy demonstrates hunting for the Cerberus banking Trojan, using Traced Control.

Categories
Phishing

Press release: New Partner Program from Traced Mobile Security

Award-winning mobile security outfit Traced, headquartered in Oxford, UK, has launched a brand new Partner Program.

Categories
Phishing Scams Support

Why your advice to spot phishing isn’t working

The human-actionable defences against phishing that we take for granted on a desktop aren’t available on a mobile.

Categories
cybersecurity Scams

How a fake Netflix app stole WhatsApp messages and spread malware

FlixOnline offered two months’ free Netflix access for free, but it was fake app harbouring malware that takes control of the victim’s Android phone.

Categories
privacy stalkerware

How a WhatsApp status loophole is aiding cyberstalkers

These WhatsApp status trackers are a new variety of surveillance software, but can be just as invasive and harmful as stalkerware.

Categories
cybersecurity

[Infographic] GDPR and the importance of mobile security for businesses

This infographic breaks down mobile security for businesses and explains how and why it is a key player in GDPR compliance.

Categories
cybersecurity Industries

Financial Services

Your phones a hot target for phishing attacks and data theft, and the front line in guarding against FCA and GDPR violations.

Categories
cybersecurity Phishing privacy spyware stalkerware

6 reasons why cybercriminals want to target your smartphone

The data is in, and it doesn’t look good: mobile devices are a primary target for online criminals.