VMware just announced the launch of its Workspace ONE Trust Network API, which offers organizations a unified approach to securing their digital workspaces. It does this by taking all the capabilities built in the Workspace …
A new jailbreak tool for iOS 13 enables permanent jailbreaking for all iPhone models between the 4s and X as well as for earlier iPad models. Developed by a group of iOS hacking experts, the …
Wandera’s threat research team has discovered seven apps on the Google Play Store which contain dropper malware. The dropper apps are designed to download and install APKs from a GitHub repository, essentially opening a backdoor …
What is cryptojacking? Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. The crypto mining code works in the background as unsuspecting victims use their computers normally. Download our Employee Protection Pack …
If you’ve read our Mobile Security in the Financial Services Report, you’ll know that there are a bunch of new trends and threats that are causing headaches for IT and security professionals in the Financial …
Wandera’s threat research team has discovered 17* apps on the Apple App Store that are infected with clicker trojan malware. The apps communicate with a known command and control (C&C) server to simulate user interactions …
What is a Man-in-the-Middle (MitM) attack? A man-in-the-middle attack occurs when the communication between two systems is intercepted by a third party, aka a Man-in-the-Middle. This can happen in any form of online communication, such …
As part of National Cybersecurity Awareness Month, we want to make sure you understand the various threats attacking your mobile device. This article will focus on malware – how to tell if your phone is …
August 2019 was an unexpected wake-up call for many, in the space of a month three major iOS attacks were reported, revealing numerous vulnerabilities. The first, in iMessage, allowed an attacker to read files off …
Full Unified Endpoint Management (UEM) is always best for your business, but depending on device ownership other management methodologies may be more suitable. Take BYOD for example, in some deployments, companies use containers to manage …