The Happiest Place on Earth is Opening Consumers’ Personal Data to Risk
Quokka researchers identify popular iOS consumer applications that pose high risk to user privacy and security as summer travel heats up.
Quokka researchers identify popular iOS consumer applications that pose high risk to user privacy and security as summer travel heats up.
How do mobile devices meet federal security standards? The NIAP Protection Profile 462 defines the essential security requirements for mobile platforms. Download now for a detailed look at compliance and certification.
Kryptowire identified a serious security vulnerability in Samsung devices running Android versions 9 through 12 that could give attackers the ability to initiate a factory reset (i.e., deleting all user data), make phone calls, install/uninstall apps, weaken HTTPS security by installing arbitrary root certificates, all from untrusted apps running in the background and without end-user approval.
Samsung’s Android devices face a critical vulnerability allowing arbitrary activity execution as the system user. This report details the flaw and its security implications. Download now to understand the risk.
New findings reveal hackers can have access to user data, phones, and more in mobile devices with this Chinese chipset.
New funding to accelerate adoption of intrusion-free mobile security into targeted verticals – including healthcare, financial services and education – and support further product development.
Cybercriminals are targeting the weakest links in software and hardware supply chains. This whitepaper explains how supply chain attacks work, why they’re a growing threat, and how to mitigate risks. Download now to protect your organization.
Data privacy and security are crucial in healthcare. This report examines the NHS’s mobile security landscape, identifying risks and solutions for improved protection. Download now for key findings on securing health apps.
Kryptowire collaborates with Orange and uncovers major vulnerabilities in mobile devices enabling immediate action with involved parties to obtain security fixes.
Copyright © 2025, Quokka. All rights reserved.