Pradeo wins Mobile Security Leadership Award from Frost & Sullivan

Posted by Stéphane Saad on August 24, 2020

Find here the full Press Release published by Frost & Sullivan: https://prn.to/2lAM8Rh


 

Pradeo's mobile security solutions are awarded for their capacity to help organizations evaluate exposure levels of their mobile deployments, adopt appropriate cybersecurity response capabilities, and respond to cybersecurity breaches, better than any of their competitors.

Read More

Why Updating Mobile OS And Application Is So Important

Posted by Roxane Suau on May 12, 2020

System and application updates always seem to pop up at less than timely moments, and most of us postpone them without second thoughts, for days, weeks, months… However, these updates represent an essential piece of systems’ stability and safety, as they include functionality enhancements and patches to security holes.

 

Read More

A basic wallpaper app dressed up into a COVID-19 info app

Posted by Roxane Suau on April 16, 2020

In those troubled times, the world population demonstrates each day an unprecedented outpouring of solidarity, goodwill and aid. Unfortunately, the Covid-19 pandemic might also be leveraged for shady purposes as per the following example.

 

Read More

COVID-19 | Mobile usage evolution and security stakes

Posted by Roxane Suau on April 08, 2020

If we are requested to not be physically mobile, mobile usages are booming due to the COVID-19 pandemic. It is no surprise that business applications are heading the list with remote working being enforced in many organizations. From an individual perspective, the containment drastically impacted our daily mobile activity with a general increase of time spent on our devices and a booming usage of social and entertainment apps (fitness, streaming…).

 

Read More

The network threats that endanger mobile devices privacy

Posted by Roxane Suau on March 05, 2020

Along the massive growth of enterprise mobility, cybercriminals looking for valuable data naturally shifted their interest toward mobile devices. Indeed, smartphones and tablets have inherent capabilities that, when exploited illegally, can provide a direct access to all the data they manipulate. Mobile threats can operate at three different layers of a device: 76% of them use mobile applications, 8% exploit the OS and 16% leverage the network. 

From phishing attempts to the more sophisticated Man-In-The-Middle, this article presents the most common network attacks used to exfiltrate data from mobile devices in the corporate environment.

 

Read More