Categories
cybersecurity

Demystifying mobile security

What is MDM? What is MTD? Or EMM? Your one-stop guide to mobile security acronyms and how the solutions fit together

Categories
Support

[Video] Detecting attackers on WiFi networks

In this short video, Ben demonstrates a MitM attack via a local coffee shop WiFi.

Categories
cybersecurity Phishing privacy spyware

Are employee phones leaking your customer data?

A data breach can cost your organisation heavily in fines, reputation, lost customers, but Mobile Threat Defence protects your remote workforce from data theft and loss

Categories
cybersecurity privacy

Android messaging app exposed private photos, audio and videos

Go SMS Pro has over 100m downloads and a 4.5 star rating, but the developers are playing fast and loose with users’ privacy.

Categories
cybersecurity privacy stalkerware

Discussing mobile threats on Tech Talks Daily

Matt Boddy chats with Neil C Hughes on his Tech Talks Daily podcast about mobile threats, the difficulty security vendors have and what makes Traced groundbreaking.

Categories
cybersecurity privacy

Are you being hacked through WiFi networks?

Criminals can use WiFi to scoop up personal information and drop malware on your devices. Here’s why WiFi protection is your first line of mobile threat defence.

Categories
cybersecurity privacy

What scammers can do with just a phone number

Our mobile numbers are often in the public domain, so here’s what you need to know to avoid scams and phishing.

Categories
privacy

WhatsApp with these disappearing messages?

WhatsApp’s offering is definitely not the same as that provided by Signal, Telegram or even Snapchat. Here’s why.

Categories
cybersecurity

Further £300k investment for Traced

Investment will support the launch of Traced’s B2B security solution, addressing the growth and digital vulnerability in the new normal of remote-working.

Categories
stalkerware

Video: Understanding Stalkerware

We spoke to Chloé Messdaghi from Point3 Security, about what it is, who uses it, and what you should do if you’re being spied on via your phone