Free trial

Whitepaper download

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps, to steal information from users. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Tehnology startup of the year 2017

Latest blog posts

By Colm 31st January 2019

Public Wi-Fi: Stealing Secrets in the Air

‘Free Wi-Fi’ – a phrase so commonly heard today that we have come to expect it in most public places. The vast majority of hotels, restaurants, coffee shops and transport systems today offer some form of Wi-Fi network for its guests and customers. In recent years, exploits using equipment such as the Wi-Fi Pineapple have […]

Read more
By Colm 8th January 2019

Corrata’s Top 5 Cyber Security Predictions for 2019

2018 was a eventful year for technology and the world of cyber-security. Privacy and the security of personal data was the main topic of discussion following major changes in legislation and multiple high-profile data breaches around the world. Phishing attacks grew more sophisticated. The spread of malware via mobile apps exploded. Machine learning emerged as […]

Read more
By Colm 21st December 2018

Mobile and Cyber Security 2018: Year in Review

As 2018 draws to a close, we here at Corrata are taking a look back at the year that was in the world of cyber security. Overall it was a very eventful 12 months, defined by high profile data breaches, major changes to privacy legislation with GDPR, and increasingly sophisticated phishing and malware attacks, but […]

Read more

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, ne...

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating system...

Mobile Data Control

Date usage growth in enterprise is expanding at an alarming rate. Our analysis shows that data usage growth rates are in the region of 70% – 140% per annum. T...

7 ways Malware Can Infiltrate Your Mobile Device

Mobile devices pack an extraordinary range of technologies into an extraordinarily compact design. Among these is a plethora of ways in which can connect to the out...