Whitepapers
Read a selection of whitepapers and briefing notes for in-depth coverage of key topics in mobile endpoint security.
Featured Whitepaper
Living with ECH Read our report on the prospects for adoption of Encrypted Client Hello.
-
reading time: 10 min
Sideloading from Unofficial App Stores: Despite the Risks, Why Do We Do it?
For most smartphone and tablet users, installing an app is a simple and safe process that involves purchasing or downloading...Download -
reading time: 10 min
The rising threat of social media phishing attacks
Phishing, attempting to fraudulently acquire sensitive personal information from an unsuspecting user, is a well-known cyber threat in today’s digital...Download -
reading time: 10 min
How to protect against an iOS hack
Mobile devices have quickly become one of the biggest targets for cyber threats such as phishing and malware attacks. The...Download -
reading time: 10 min
Public Wi-Fi: Stealing Secrets in the Sky
‘Free Wi-Fi’ - how secure is it? Learn the differences between open and closed Wi-Fi connections and how to keep...Download -
reading time: 10 min
Machine Learning: a New Frontier in Mobile Phishing Protection
An examination of 'Zero-day' phishing attacks, the capabilities of machine learning, and Corrata's technical solution.Download -
reading time: 10 min
3 Key Developments in Mobile Phishing That Every Organization Should Know
Phishing attacks are becoming more common and more difficult to spot. Understanding the evolving strategies of cyber criminals is crucial...Download