IoT Security: Threat to an Opportunity

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets.  From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

Be the Cyber Knight in Shining Armor: Protect Your Subscribers From Cyber Bullies

As anonymized messaging apps top the download charts, their popularity raises the increasingly serious issue of cyberbullying.  Communication service providers, network owners and operators that are conscious of this issue can play a significant role in protecting vulnerable users and strengthen their position as more than just “pipe providers”. So how can you become the…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

“Ignorance is Bliss” No Longer an Option When It Comes to Mobile Security for consumers

It is an accepted fact that, since the beginning of this decade, cyber-attacks on mobile devices have been growing rapidly, with no signs of slowing down. In fact the prevalence of Mobile-malware designed to infect smartphone operating systems and applications, grew over 300% in 2016. And yet, in the mindset of the consumer, attacks on…

1 2