Blog
Read our blog to get expert insights into the most pressing issues in mobile security including the latest threats and how to counter them.
Filter by:
-
Jan 21, 2025 · 4 min read
TikTok alternative, RedNote, leaking user data
Read moreTikTok alternative, Xiaohonghsu, transmitting user data in plaintext. The news that Donald Trump has intervened to keep TikTok accessible for…
-
Oct 10, 2024 · 6 min read
No Filter – Part One
Read moreSpear phishing exposes the ‘mobile gap’ in enterprise defenses. Spear phishing is one of the most effective, widely deployed, and…
-
Aug 8, 2024 · 4 min read
Stealing secrets – the menace of mobile RAT’s
Read moreSmartphones infected with Remote Access Trojans are a critical risk for enterprise security Remote Access Trojans (RATs) have plagued Android…
-
Jul 22, 2024 · 5 min read
MFA Bypass – Stealing Cookies
Read moreHow Adversary-in-the-Middle attacks undermine multi-factor authentication According to Verizon’s authoritative Data Breach Investigation Report, 90% of data breaches start by…
-
Jul 12, 2024 · 6 min read
Pegasus, Predator, Hermit Spyware – NSO and its clones
Read moreRise in known exploits point to the proliferation of sophisticated cyber-surveillance tools targeting iOS and Android devices. The recent revelation…
-
Mar 27, 2024 · 5 min read
Uncovering a sophisticated QR code phishing attack
Read moreA Case Study on Enhanced Security Measures In a recent cybersecurity incident a sophisticated phishing attack was unveiled, employing QR…
-
Feb 21, 2024 · 5 min read
Is it Safe ?
Read moreWhen devices hide their identity, how can we tell if they are safe? Many of us, especially those of a…
-
Jan 29, 2024 · 4 min read
QR Codes – Sidestepping cyberdefenses
Read moreScan with Caution In the digital age, our defences against phishing have traditionally focused on the familiar: URL scanning, email…
-
-
Dec 4, 2023 · 4 min read
The most dangerous app on your phone
Read moreThe many ways that cybercriminals target your phone’s messaging app If, like the founding team at Corrata, you’ve been working…
-
Nov 6, 2023 · 4 min read
IoT – Shadowy Things ?
Read moreIOT – Security Implications for Enterprise Use The Internet of Things (IoT) has been a game-changer in personal and professional…
-
Sep 14, 2023 · 15 min read
Deceptive Downloads: The Silent Menace of Trojanized Messaging Apps
Read moreIn today’s digital age, messaging apps have become an integral part of our daily communication. From personal chats to professional…