In-App Protection | Prevent fraud by thwarting clones and fake apps

Posted by Roxane Suau on September 21, 2020

Despite being built with various shielding techniques, mobile apps are easily cloned or mimicked. As a result, fraud figures have kept growing since the advent of mobile banking and payments, and counterfeit apps infiltrating stores generates serious reputation and trust issues.

 

Read More

IDC recognizes Pradeo as core Mobile Threat Defense vendor

Posted by Roxane Suau on September 09, 2020

The market research firm IDC just released its latest marketscape dedicated to the assessment of Mobile Threat Management software vendors in 2020. Once again, Pradeo is featured as a core player delivering cutting-edge Mobile Threat Defense capabilities to address the continuously evolving mobile security environment.

 

Read More

Security alert | 6 new apps with Joker malware on Google Play

Posted by Roxane Suau on August 31, 2020

Update September 2nd: The infected applications have now been deleted from Google Play, but are still installed on the devices of their users.


Joker is a malicious bot (categorized as Fleeceware) which main activity is to simulate clicks and intercept SMS to subscribe to unwanted paid premium services unbeknownst to users. By using as little code as possible and thoroughly hiding it, Joker generates a very discreet footprint that can be tricky to detect.

In the last year, the malware was found hiding in hundreds of apps. Today, Pradeo once again identified infected applications on Google Play (listed below), showing the store's struggle to prevent malicious activities on its platform. Altogether, the 6 apps account for nearly 200.000 installs. Users are advised to immediately delete them from their device to avoid fraudulent activities.

Read More

Pradeo wins Mobile Security Leadership Award from Frost & Sullivan

Posted by Stéphane Saad on August 24, 2020

Find here the full Press Release published by Frost & Sullivan: https://prn.to/2lAM8Rh


 

Pradeo's mobile security solutions are awarded for their capacity to help organizations evaluate exposure levels of their mobile deployments, adopt appropriate cybersecurity response capabilities, and respond to cybersecurity breaches, better than any of their competitors.

Read More

Phishing: Why is it so effective on mobile?

Posted by Roxane Suau on July 02, 2020

It is probably one of the most popular threat of our digital world but still, years after years, phishing continuously tops the list of the most common attack types.

Per Wikipedia: “Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.”

 

Read More