LATEST NEWS: Corrata partners with Three Ireland See More
LATEST NEWS: Corrata becomes FirstNet Verified See More
'Securing Your SMB Customers' Webinar Read highlights
Free Trial

Briefing Notes

Read our latest briefing notes, whitepapers and infographics for top industry insights

Why Google and Apple’s Malware Protection Might Not Be Good Enough

Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, an...
Download Briefing Note

Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?

For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from the Apple App Store or Google Play Store. ...
Download Briefing Note

The Rising Threat of Social Media Phishing Attacks

Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world. ...
Download Briefing Note

Mobile security solution review in light of the WhatsApp Pegasus hack

Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The rate at which they are used for personal use, as well as business operations...
Download Briefing Note

Public Wi-Fi: Stealing Secrets in the Sky

‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep your information safe when browsing online. ...
Download Briefing Note

Machine Learning: a New Frontier in Mobile Phishing Protection

An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution. ...
Download Briefing Note

Whitepapers

Infographics

Blog

The top four mobile phishing channels hackers are using

Mobile phishing is becoming more prevalent and more difficult to spot In recent years, hackers have moved away from traditional mediums like email. Instead, mobile phishing is their new approach and a...
Read more

Zero Gateway – The modern approach to APN and proxy services

Latency, privacy concerns and connection failure are a thing of the past thanks to Zero Gateway   Fifteen years ago, organizations widely embraced gateway based services for their cloud and ...
Read more

QR code security risks: innocent scan or malicious scam?

QR codes can be easily abused by scammers so how do we use them safely? QR codes are becoming more and more popular due to their multi-purpose functionality and their ability to read information at ra...
Read more