Google copies Apple, clamps down on Android coders Writing non-Play Store apps? You’ll have to show ID and pay a fee anyway. Paul Ducklin Aug 29, 2025 Read Article Read
Juicejacking revisited: Should you charge your phone at the airport? Just how safe are public power outlets and borrowed chargers? Paul Ducklin Aug 12, 2025 Read Article Read
Top 3 Challenges of Implementing MDM in any Organization Learn about the top three challenges companies face with MDM implementations. Hwei Oh Jul 23, 2025 Read Article Read
Why Traditional MDM Doesn’t Work Toward Minimizing Risk Understand why traditional MDM has its drawbacks when it comes to security. Hwei Oh Jul 01, 2025 Read Article Read
Privacy-First Mobile Security: How to Protect Data the Right Way How to implement a privacy-first mobile security strategy for your organization. Hwei Oh Jun 12, 2025 Read Article Read
How Mobile Apps Can Put Devices (and Organizations) at Risk Personal devices used for work expose company data to risk from unvetted apps businesses can’t fully control. Hwei Oh Jun 03, 2025 Read Article Read
SIM Swapping and 2FA Bypass Attacks Neither MDM nor 2FA are enough on their own to keep you safe. Here’s why… Hwei Oh May 21, 2025 Read Article Read
Tales from the SOC: AI in cybersecurity – Bane or benefit? | S1 Ep012 Why does it sometimes sound as though no one ever thought of using AI in cybersecurity until now? Paul Ducklin May 21, 2025 Read Article Read
Mobile spyware in the spotlight as NSO Group hit with $167 million damages “All without people’s knowledge, let alone authorization.! Paul Ducklin May 13, 2025 Read Article Read
Mobile Under Fire: Spyware, Exploits & Zero-Click Attacks Deep dive on mobile related spyware, exploits and zero-click attacks. Charles Ho May 07, 2025 Read Article Read
Mobile Workforce Risks to Be Aware Of Mobile risks that executive and non-executive personnel pose. Hwei Oh May 05, 2025 Read Article Read
The Six Hidden Risks of BYOD: How Personal Devices Can Compromise Corporate Data How your security team can mitigate BYOD risks to avoid a costly breach. Hwei Oh Apr 29, 2025 Read Article Read
Phishing and Smishing: How they work and what to do about them (Part 2 of 2) We burrow into a real-life smishing scam, so you don’t have to. Paul Ducklin Apr 28, 2025 Read Article Read
Phishing and Smishing: How they work and what to do about them (Part 1 of 2) Phishing, meet Vishing, and Quishing, and Smishing. We help you tackle the lot of them. Paul Ducklin Apr 28, 2025 Read Article Read