Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics

Mobile Security Amongst Olympic Teams at the Paris 2024 Summer Olympics

July 25, 2024 Krishna Vishnubhotla Share this blog As the world gathers for the 2024 Summer Olympics in Paris, the focus is not only on the athletes’ performances but also on the technology that supports them. Mobile devices have become indispensable for Olympic teams, providing critical data for training, performance tracking, and real-time analysis. However, with…

Sophisticated Fake Apps: A Growing Concern

Sophisticated Fake Apps: A Growing Concern

March 27, 2024 Monique Becenti Share this blog Cybercriminals are employing increasingly sophisticated tactics to target unsuspecting users. One such tactic gaining traction is smishing – an attack that leverages text messages to deceive individuals into providing sensitive information or downloading malicious content. In this latest trend, cybercriminals create fake apps that mimic legitimate banking or financial services. These apps…

Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps

Defending Your Mobile Workspace: Mitigating Risks of Sideloading Apps

March 26, 2024 Monique Becenti Share this blog In today’s digitally-driven workplace, mobile applications (apps) have become indispensable tools for enhancing productivity and providing teams with seamless communication. As employees seek additional functionality and features beyond what official app stores offer, they often turn to third-party app stores. While the idea of third-party app stores may…

Every Industry’s Battle: The Threat of Mobile Malware on the Enterprise

Every Industry’s Battle: The Threat of Mobile Malware on the Enterprise

May 15, 2024 Krishna Vishnubhotla Share this blog As we observed in our 2023 Mobile Banking Heists report, mobile banking apps have traditionally been a target for mobile malware due to the direct financial incentives for cybercriminals. But in today’s digital age, mobile applications have become the cornerstone of productivity, business growth, and user engagement in almost…

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

Patching High Impact Vulnerabilities: A Retrospective on WebP CVE

May 13, 2024 Antonio Nappa Share this blog Special thank you to Marina Caro who assisted in writing this blog. Patching alone isn’t enough to fix vulnerabilities Almost all mobile devices have at least one app with a critical vulnerability. Even if a patch is available, that critical vulnerability can leave the app and your data…

Why Protecting Public Sector Personnel’s Devices is Essential

Why Protecting Public Sector Personnel’s Devices is Essential

May 8, 2024 Kern Smith Share this blog Given our mobile-first lifestyle, cyber attackers are continuously honing their smishing strategies to exploit vulnerabilities, indiscriminately targeting government-issued and personal devices. The recent hack of Senator Lindsey Graham’s phone offers a critical case study, revealing how smishing attacks can successfully compromise personal devices with alarming consequences. Understanding the…

Turn On The Lights: Why Runtime Protection Matters for Mobile Apps

Turn On The Lights: Why Runtime Protection Matters for Mobile Apps

April 29, 2024 Jake VanAdrighem Share this blog It’s essential to recognize that security is not synonymous with knowing your threats. High-value software cannot be adequately protected by arbitrarily embracing code obfuscation and runtime protection alone. To achieve proper application security, you must ensure your protections act against active and relevant threats. Traditionally, businesses have safeguarded critical…

Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle

Securing Mobility: Navigating the NIST Enterprise Mobile Device Lifecycle

April 16, 2024 Monique Becenti Share this blog Mobile devices are the cornerstone of enterprise operations, enabling flexibility, productivity, and connectivity like never before. In an era where agility and accessibility are paramount, employees and officials rely heavily on their mobile devices to access critical information, regardless of location. However, ensuring the security of these devices…

Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats

Navigating the Digital Maze: Secure Your Retail Business from Mobile Cyberthreats

April 4, 2024 Monique Becenti Share this blog In the fast-paced world of commerce, mobile threats present ongoing challenges for global retailers, impacting both consumer-facing operations and behind-the-scenes tasks. With technology increasingly integrated into every aspect of retail operations, from inventory management to customer engagement, mobile devices have become indispensable tools. However, this reliance on mobile…

QR Code Phishing: How Enterprises Can Stay Secure

QR Code Phishing: How Enterprises Can Stay Secure

QR codes have surged in popularity in the past two years, mainly due to their convenient and touchless features that streamline daily transactions-making it easy for users to scan and access information quickly. Nearly 89 million smartphone users in the U.S. have scanned a QR code, with growth projected to reach over 100 million users by 2025. However, the…