Cybersecurity experts are unanimous, mobile apps are hackers’ preferred vector to exfiltrate valuable data from mobile devices. Yet, the flexibility...
Continue ReadingApplication threat analysis/App vetting: how to separate key decision-making insights from pointless information
By
Roxane Suau on June 26, 2020
Needless to emphasize that applications stand at the very heart of mobile usages. Except for very specific business cases, mobile workers require...
Continue ReadingWhy cloning your app is a piece of cake?
By
Roxane Suau on June 19, 2020
One thing is certain: cloning an application is a child’s play for cyber-criminals. Fake apps (or clones) are Android or iOS mobile applications that
Continue ReadingMobile security solutions comparison
By
Roxane Suau on May 28, 2020
Workers are undeniably mobile with 80% of corporate tasks to take place on mobile devices in 20201. With 77% of the digital traffic2 coming from...
Continue ReadingWhy Updating Mobile OS And Application Is So Important
By
Roxane Suau on May 12, 2020
System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days,...
Continue Reading