
World Backup Day – It’s Time to Backup Your Devices
In honor of World Backup Day, and as believers in being proactive guardians of personal data, we want to encourage you to backup your data today.
In honor of World Backup Day, and as believers in being proactive guardians of personal data, we want to encourage you to backup your data today.
In recent news, the DC Health Link confirmed that it suffered a data breach that exposed the personal health data of more than 56,000 customers, including members of Congress.
A recent joint alert released by the Cybersecurity and Infrastructure Security Agency, the FBI and the Multi-State Information Sharing and Analysis Center stated that multiple attackers were able to compromise a system at one unnamed Federal civilian executive branch agency from November 2022 to January 2023, and advised other organizations to take action to mitigate any similar vulnerability.
Many CISOs find themselves flanked by a range of intense legal requirements amidst a quickly changing technology landscape that can prove difficult to secure effectively. We’re sharing the top three fintech-related security issues that keep CISOs up at night.
This blog aims to increase awareness of the cloak and dagger modus operandi, specifically how it utilizes two seemingly innocuous techniques to exploit users’ trust in banking apps. For end users, app developers, CIOs, CISOs, understanding these tactics could be the key to protect your financial assets and your organization’s reputation.
Mobile banking apps are useful tools for managing our finances on-the-go. In this blog post, we will discuss the various risks associated with mobile banking apps and how you can keep yourself safe while using them.
CISA is proud to expand access to the Mobile App Vetting (MAV) service. CISA granted MAV an Authorization to Operate on February 8th, 2023, acknowledging the service’s key role in combating a growing risk of mobile app vulnerabilities threatening Federal Civilian Executive Branch (FCEB) agencies. Moreover, it is available at no cost to the user.
A hidden system app can also be referred to as a ghost app and although these applications can be beneficial they can also pose threats to the user.
End-to-end encryption is an important feature for mobile applications, especially when it comes to security and data privacy. But is all your data encrypted in mobile apps? Who is in charge of encryption?
Copyright © 2025, Quokka. All rights reserved.