Why Google and Apple’s Malware Protection Might Not Be Good Enough
Mobile malware can take many different forms. Spyware, adware, ransomware, and Trojans are commonly hidden in seemingly innocent apps and communications designed to fool users to take over, damage, and steal information from mobile devices.
Download briefing note Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?
For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading a file from the Apple App Store or Google Play Store.
Download briefing note The Rising Threat of Social Media Phishing Attacks
Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital world.
Download briefing note How to protect against an iOS hack
Mobile devices have quickly become one of the biggest targets for cyber threats such
as phishing and malware attacks. The rate at which they are used for personal use, as well as
business operations, make mobile devices especially vulnerable to attack.
Download briefing note Public Wi-Fi: Stealing Secrets in the Sky
‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep your information safe when browsing online.
Download briefing note Machine Learning: a New Frontier in Mobile Phishing Protection
An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution.
Download briefing note 3 Key Developments in Mobile Phishing That Every Organization Should Know
Phishing attacks are becoming more common and more difficult to spot. Understanding the evolving strategies of cyber criminals is crucial to staying protected from phishing attempts.
Download briefing note Understanding Alternative Approaches to Device Security
Threats against mobile devices are increasing, putting companies' sensitive information at risk. Understand the pro's and con's of Mobile Threat Defence solutions and how Corrata's technology avoids these common MTD pitfalls.
Download briefing note DNS over HTTPS – Anti-Phishing Solutions are going Dark
A breakdown of DNS Sniffing and how this solution to phishing will be affected by decisions to encrypt DNS traffic.
Download briefing note