The Pradeo Lab identifies another app with Joker malware on Google Play

Posted by The Pradeo Lab on October 22, 2019

Update: The app “Int App Lock” has now been deleted from Google Play and added to global antiviral databases.


Joker is a malware that silently exfiltrates data and subscribes users to unwanted premium subscription. In September, the malware was found in 24 apps on Google Play. Last week, Pradeo researchers identified another infected application still featured on Google Play. The app called Int App Lock, a tool intended to lock access to some data with a PIN code, was installed on 10,000+ devices. Users are advised to immediately delete it from their device.

 

Read More

Pradeo launches a Private Secure Store solution to facilitate and expand safe BYOD usages for companies

Posted by Roxane Suau on October 15, 2019

After being awarded by Frost & Sullivan for best mobile security, Pradeo adds a new offer to its product line to address a strong mobile security need so far unanswered.

 

Read More

Rohde & Schwarz Cybersecurity and Pradeo launch a unified application security offer

Posted by Stéphane Saad on October 09, 2019

 

Press Release



Rohde & Schwarz Cybersecurity and Pradeo, leaders of IT security and mobile security respectively,
are shedding the light today on a joint offer, dedicated to protecting web and mobile applications
with an end-to-end approach.

 

Read More

IDC recognizes Pradeo as a Leader of Mobile App Security Testing

Posted by Roxane Suau on September 24, 2019

A few days ago, the market research firm IDC published its new report assessing worldwide Mobile Application Security Testing (MAST) vendors. Pradeo’s comprehensive expertise in the field earned it to be rewarded as a leader of the market.

 

 

Read More

What Zero Trust means for mobile security?

Posted by Roxane Suau on September 12, 2019

The Zero Trust model, first identified by the research firm Forrester, is a security approach based on the principle of not trusting any network or data access request by default, even when it comes from inside the company perimeter. Zero Trust goes beyond the identity approach which focuses on only authenticating the user. It has emerged as the most reliable way for companies to keep away cyberthreats evolving within their distant and immediate environment.

 

Read More