Free Trial

Corrata's Mobile Security Blog

The latest mobile security news, top quality insights, and industry analysis

European Cybersecurity Startup of the Year 2018
Filter by
By Colm 10th July 2019

GDPR Bites – What’s Behind the Record Fines for British Airways and Marriott Data Breaches?

This week it was announced that two major international companies, airline British Airways and hotel giant Marriott International, would be fined £183 million ($228 million) and £99 million ($123 million) respectively for data breaches that infringed new requirements set out by the EU’s General Data Protection Legislation (GDPR). The record penalties, issued by the UK’s […]

Read more
By Colm 7th July 2019

Understanding Malware Part 2 – What is Advanced Mobile Malware?

As users are steadily moving away from desktop and favoring mobile devices, it is inevitable that hackers will also switch their tactics. And as an increasing number of sensitive and high-value tasks are carried out on mobile devices, mobile specific threats are fast becoming a major concern. Mobile malware, in its many different forms and […]

Read more
By Colm 3rd July 2019

Chinese Border Authorities Forcing Surveillance Malware onto Tourists’ Phones – What Does this Mean for Organizational Data Security?

Tourists crossing the border into the Xinjiang region in China are being forced to install a piece of malware on their phones capable of downloading text messages and scanning over 70,000 different files, a collaboration by Motherboard, Süddeutsche Zeitung, the Guardian, the New York Times, and the German public broadcaster NDR has found.  The Uighur […]

Read more
By Colm 2nd July 2019

Understanding Malware Part 1 – What is Social Engineering?

Anyone that reads tech blogs or is following the latest industry news on social media will know that one of the most significant cyber-threats facing organizations today is mobile malware. On almost a daily basis, we are bombarded with articles and news reports detailing the latest malware strands making the rounds or the malicious apps […]

Read more
By Colm 27th May 2019

In Light of the WhatsApp Hack, Which Approach to Mobile Device Security Offers the Best Protection?

Anti-virus, Mobile Device Management and Mobile Threat Defense won’t help against today’s attacks – so where should you look for protection ? On May 13th the Financial Times reported that a recently discovered vulnerability in the hugely popular messaging app WhatsApp had allowed attackers to inject commercial spyware onto mobile devices. The hack involved the […]

Read more
By Colm 24th May 2019

Why Google and Apple’s Malware Protection Might Not Be Good Enough – Part 2

Last week, Part 1 of our two-part series outlined the current defense systems offered by Apple and Google, two of the world’s biggest mobile operating system developers, to protect devices from mobile malware. We found that despite strict content requirements and security scans, malicious and suspicious apps are still able to make their way onto […]

Read more
By Colm 21st May 2019

Why Google and Apple’s Mobile Malware Protection May Not Be Enough – Part 1

Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices. And with 42 million mobile malware attacks occurring every year, the problem only seems to be getting worse. In this […]

Read more
By Colm 14th May 2019

What’s Up with WhatsApp?

Following the discovery of a vulnerability (documented here) that allows the remote installation of spyware on mobile devices, WhatApp has issued a warning to all 1.5 billion of its users to update to the latest version of its app. Uncovered by Facebook-owned WhatsApp in early May, the vulnerability was found to leverage a bug in […]

Read more
By Colm 29th April 2019

Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do It?

For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from their designated app store. However, there is an alternative to the official Apple App Store or Google Play Store which although beneficial to the user, has also proven to present considerable risks. […]

Read more