Free trial

Whitepaper download

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps, to steal information from users. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Tehnology startup of the year 2017

Latest blog posts

By Colm 2nd April 2019

3 Key Developments in Mobile Phishing That Every Organization Should Know

Internet phishing is not a new threat. It has existed for many years in many different forms, constantly evolving and becoming more sophisticated in response to technical trends. Because of this however, it is essential that organizations and their phishing detection and protection solutions are also able to adapt in response to changes. Recently Cofense […]

Read more
By Dylan 13th March 2019

Corrata: extending Microsoft Defender ATP protection to Android & iOS devices

Maarten Goet recently got busy with Corrata’s data control and mobile security solution. Exploring the recent integration between Microsoft Defender Advanced Threat Protection and Corrata was on Maarten’s to do list and his hands-on experience is detailed on the Microsoft MVP and Regional Directors blog here. Corrata works very different from other solutions. Most other endpoint […]

Read more
By Colm 8th March 2019

MWC19’s Hottest Topic: 5G – Are You Ready for the Change?

Last week the biggest names in mobility gathered in Barcelona for Mobile World Congress 2019, the largest mobile industry event in the world, bringing together the latest innovations and leading-edge technology from more than 2,400 companies. While folding smartphones, IoT, Big Data, and VR headsets were some of the hottest topics among vendors and attendees, […]

Read more

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, ne...

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating system...

Mobile Data Control

Date usage growth in enterprise is expanding at an alarming rate. Our analysis shows that data usage growth rates are in the region of 70% – 140% per annum. T...

7 ways Malware Can Infiltrate Your Mobile Device

Mobile devices pack an extraordinary range of technologies into an extraordinarily compact design. Among these is a plethora of ways in which can connect to the out...