Two of the biggest stories in cyber security in 2017 were the discovery of critical flaws in the security of two widely used technologies.  In September researchers disclosed the discovery of Bluebourne, a Bluetooth based attack vector which makes it possible to steal data from almost any Bluetooth enabled device.  In October, the announcement that…

Read More

Today’s Mobile Threat Landscape

Unusually for such a world-changing event, we can pinpoint the exact moment when the smartphone revolution began.  It was at 9:47 am Pacific Standard Time on 9 January 2007 that Steve Jobs unveiled the iPhone.  To industry vendors such as Nokia or Blackberry, the fact that it didn’t have 3G radio meant that it wasn’t…

Read More

For a cybersecurity perspective, today’s dominant mobile operating systems have considerable advantages over legacy desktop systems.  Application isolation means that applications are restricted from interfering with the behavior or data of other applications and have highly restricted access to underlying system functions.  The app store software distribution model means that by default applications and their…

Read More

We’re delighted to report that we’ve been shortlisted for the StartUp Europe Cybersecurity award.  Dubbed ‘the Eurovision for Startups’ the Startup Europe awards are are an initiative of the European Commission and Finnova Foundation.  The awards are designed to support the development of European businesses that can scale their services and products at a global…

Read More

So what is Krack? This week a researcher at the Belgian university KU Leuven revealed that he had discovered a previously unknown vulnerability in the WPA2 Wi-Fi security protocol.  The vulnerability, dupped KRACK,  would allow a hacker to intercept traffic passing between any device (phone, tablet, laptop, IOT device etc) and a Wi-Fi access point….

Read More

Google’s Verify Apps API

Google recently announced the availability of a new security API for Android. The new ‘SafetyNet Verify Apps API will enable developers to query whether an Android device is protected by Google Verify Apps’ anti-virus software. The API will also make it possible to identify any potentially harmful apps installed on the device.   Google Verify Apps…

Read More

Here at Corrata we’ve long believed that a critical step in understanding the status of a mobile security on a device is examining how it interacts with the network. The recent Igexin spyware scare on the Google Play Store is an excellent illustration as to why this is the case and highlights significant drawbacks in relying on…

Read More

On Saturday night, the Mayweather McGregor bout is expected to gross $500M plus on pay-per-view alone. That would put in the same league as the all time top ten grossing movies in the US. Hence they’re calling it the ‘money fight’. Using the word ‘fight’ is stretching it a bit given only one of them…

Read More

In our last blog post we outlined how the patch process works and explained why up to one-third of iOS devices and almost all Android devices are still running on old operating system versions. New updates need to be released all the time to add new features, fix bugs and patch up mobile security vulnerabilities….

Read More