Blog
Read our blog to get expert insights into the most pressing issues in mobile security including the latest threats and how to counter them.
-
No Filter – Part One
Read moreSpear phishing exposes the ‘mobile gap’ in enterprise defenses. Spear phishing is one of the most effective, widely deployed, and…
-
Stealing secrets – the menace of mobile RAT’s
Read moreSmartphones infected with Remote Access Trojans are a critical risk for enterprise security Remote Access Trojans (RATs) have plagued Android…
-
MFA Bypass – Stealing Cookies
Read moreHow Adversary-in-the-Middle attacks undermine multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start by…
-
Pegasus, Predator, Hermit Spyware – NSO and its clones
Read moreRise in known exploits point to the proliferation of sophisticated cyber-surveillance tools targeting iOS and Android devices. The recent revelation…
-
Uncovering a sophisticated QR code phishing attack
Read moreA Case Study on Enhanced Security Measures In a recent cybersecurity incident a sophisticated phishing attack was unveiled, employing QR…
-
Is it Safe ?
Read moreWhen devices hide their identity, how can we tell if they are safe? Many of us, especially those of a…
-
QR Codes – Sidestepping cyberdefenses
Read moreScan with Caution In the digital age, our defences against phishing have traditionally focused on the familiar: URL scanning, email…
-
The most dangerous app on your phone
Read moreThe many ways that cybercriminals target your phone’s messaging app If, like the founding team at Corrata, you’ve been working…
-
IoT – Shadowy Things ?
Read moreIOT – Security Implications for Enterprise Use The Internet of Things (IoT) has been a game-changer in personal and professional…
-
Deceptive Downloads: The Silent Menace of Trojanized Messaging Apps
Read moreIn today’s digital age, messaging apps have become an integral part of our daily communication. From personal chats to professional…
-
QR code security risks: innocent scan or malicious scam?
Read moreThe recent news that QR codes had been used in a large-scale phishing attack against a major US energy company…