Blog

The latest industry news in cybersecurity’s ever-evolving landscape.

Strengthening Mobile App Security: Defense in Depth with MAST & RASP

Strengthening Mobile App Security: Defense in Depth with MAST & RASP

In this blog, we will delve into two crucial components of defense in depth: Mobile Application Security Testing (MAST) and Runtime Application Self-Protection (RASP).
Read More
Examining the Security of Pre-installed Software on Prepaid Android Carrier Smartphones

Examining the Security of Pre-installed Software on Prepaid Android Carrier Smartphones

In this blog, we share an overview of the security holes we found in pre-installed software on prepaid Android carrier smartphones.
Read More
Managing the Security and Privacy Pitfalls of Mobile App Extensions

Managing the Security and Privacy Pitfalls of Mobile App Extensions

Mobile app extensions are allowing developers to create advanced user experiences globally. As complexity grows, so does the importance of prioritizing security and data privacy.
Read More
Securing Mobile App-First Companies in the Age of the Gig and Remote Workforce

Securing Mobile App-First Companies in the Age of the Gig and Remote Workforce

In an age where employees are increasingly mobile and digital technologies have become ubiquitous in the workplace, companies must make sure they have secure systems for protecting their data, applications and communication networks.
Read More
Mobile Device Management vs Personal Device Management

Mobile Device Management vs Personal Device Management

Personal Device Management approaches device security differently than an MDM. Choosing PDM over MDM is a wise choice for organizations that prioritize employee privacy and data security.
Read More
Traveling to a Different Country? Be Aware of these Privacy Risks when Bringing Your Smartphone

Traveling to a Different Country? Be Aware of these Privacy Risks when Bringing Your Smartphone

If you are planning to travel to either of these countries, it’s important to take steps to protect your smartphone and your privacy.
Read More
Quokka Introduces Personal Device Management and App Network Filtering Features to Enhance Mobile Security

Quokka Introduces Personal Device Management and App Network Filtering Features to Enhance Mobile Security

Learn how Quokka's new Q-Scout capabilities can benefit your organization's mobile security strategy.
Read More
The Spread of ByteDance Code Beyond the TikTok App

The Spread of ByteDance Code Beyond the TikTok App

In this blog, we focus on the spread of code written by the creators of TikTok throughout App Stores.
Read More
The Surge in Artificial Intelligence Poses Cybersecurity Concerns

The Surge in Artificial Intelligence Poses Cybersecurity Concerns

Attackers are leveraging AI to craft software that can exploit vulnerabilities in ways never seen before. These sophisticated programs can alter their appearance and processes to slip past traditional detection methods, allowing them to exfiltrate sensitive data undetected.
Read More

Newsletter

Subscribe today for news, updates, and insights for your work and live anywhere world.