Free trial

Whitepaper download

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, new avenues for cyberattacks, especially phishing attacks, have emerged. Cybercriminals have recognized the potential value in exploiting channels such as social media, messaging services and mobile apps, to steal information from users. This whitepaper looks at the rising threat of mobile phishing and what organizations can do to protect their devices.

Tehnology startup of the year 2017

Latest blog posts

By Colm 3rd December 2018

Guest Post: The Benefits of Security Training in Your Organization – Why You Should Build a Human Firewall

The content of this article was originally published by Stephen Burke at Cyber Risk Aware As the latest data shows, billions are being lost to cyber-crime each year. Just last week it was confirmed that the personal data of over 500 million customers of the Marriott-owned hotel chain Starwood Hotels, was stolen in a major […]

Read more
By Colm 26th November 2018

To Block or Not to Block: Solving the Compliance Issue for Employers this Cyber Monday

Thanksgiving – traditionally associated with family, friends and food – has in recent years also become synonymous with sales and bargains thanks to the popularity of Black Friday. The annual event, offering customers unmissable discounts on almost all purchases, has spread not just from the US to the rest of the world, but also from […]

Read more
By Colm 21st November 2018

Machine Learning: a New Frontier in Mobile Phishing Protection

Mobile devices today are particularly susceptible to cyber attacks as more and more companies evolve into a ‘mobile workforce’. Employees that use mobile devices for both personal and professional business receive communications through an increasing number of channels, meaning that instead of just email, organizations are now exposed to phishing attacks through platforms such as […]

Read more

Whitepapers

Mobile Phishing

Mobile devices, such as smartphones and tablets, have become essential to our everyday lives both at work and at home. However with this increased use of mobile, ne...

Today's mobile threat landscape

Much has changed in enterprise mobility since the launch of the iPhone ten years ago. Among other things, we've seen improvements in the underlying operating system...

Mobile Data Control

Date usage growth in enterprise is expanding at an alarming rate. Our analysis shows that data usage growth rates are in the region of 70% – 140% per annum. T...

7 ways Malware Can Infiltrate Your Mobile Device

Mobile devices pack an extraordinary range of technologies into an extraordinarily compact design. Among these is a plethora of ways in which can connect to the out...