Monitoring Smartphone behaviour to detect data leakage
After analyzing what happened to his smartphone, it appeared that the only key to detect Jeff Bezos’ hack was to monitor data traffic to detect
After analyzing what happened to his smartphone, it appeared that the only key to detect Jeff Bezos’ hack was to monitor data traffic to detect
We will be at RSA 2020, the major trade show in cybersecurity space, from Feb 24th to 28th, at the San Francisco Moscone Center, to
The United Nations report published yesterday, about the iphone hacking of Jeff Bezos, owner of Amazon and The Washington Post, has brought the vulnerability of
Stranhogg has been commented a lot this last week, but it happens that it is not a new vulnerability: it has been known since 2015,
It’s one of the most familiar conversations in the customer call center: your user has run over their mobile data allowance, and they want to
From a business standpoint, having an “office in your pocket” is invaluable, making your workforce effective and productive both at home and in the field.
In the first two parts of our series on network security and mobile security solutions, we covered network-based tactics, and app & OS based tactics
In Part I of our look at mobile security threats, we took a look at the most dangerous threats mobile devices are facing: network threats. What
Welcome to Part I of our three-part coverage of the landscape of mobile security threats. Over the course of this series, we will cover: Network
This website uses cookies. By continuing to browse the site your are agreeing to our use of cookies. Review our cookies information for more details