Capturing your credentials as you log on to apps, Vultur uses screen recording to gain access your bank and social media accounts.
What are remote access scams and what should you look out for to avoid falling victim to one yourself?
From phishing to apps, here are the crucial mobile threats businesses need to be aware of – and protect against.
We’re pleased to announce the launch of Personal Privacy Mode – an optional setting that returns only the compliance state of the device, and nothing else.
In the first half of 2020, law firms reported to the SRA that nearly £2.5m of money held had been stolen by cybercriminals.
If you’ve already got MDM, can you justify also having MTD?
In April, Android users were attacked by a new viral threat that swept the UK and infected phones by the thousand. Called FluBot, it spread by sending phishing messages via SMS texts.
A summary of the main features of the Android and iOS Traced apps.
It’s a problem in the industry that infuriates me – large cybersecurity companies apply the same threat model to all platforms.
For those who want to dig a little deeper into their organisation’s mobile threats, Traced CTO Matt Boddy demonstrates hunting for the Cerberus banking Trojan, using Traced Control.