Latest mobile cyber threat articles

blue and pink microchip

How to maximize your EMM / UEM investment with an MTD solution

A wide range of organizations work with Unified Endpoint Management (UEM) providers to centrally manage their devices. While UEMs have clearly helped enable and simplify administrative aspects of enterprise mobility,…

The importance of zero-trust in a BYOD environment

Zero-trust is the vogue term for the security industry with seemingly every company repositioning accordingly, but, for good reason. In a mobile-first world with personal devices being used for work,…

iOS app permissions – are your apps asking too much?

We purchase and download apps, giving them endless permissions without hesitation so we can access all the flashy functionality they have to offer. But at what cost? It’s time to…

Is ransomware a problem on mobile?

Ransomware was not a word many were familiar with until WannaCry made its public debut on May 12, 2017 and infected devices at organizations in over 150 countries worldwide. Media…

Gartner Market Guide to Mobile Threat Defense Solutions

The report helps security leaders better understand the mobile threat defense market and shortlist solutions currently available that best fit their specific needs.

It concludes that security and risk management leaders must familiarize themselves with mobile threat defense solutions and plan to integrate them to mitigate mobile risks.

The malware table of variants

Whether it’s spyware or ransomware, get a sense of the latest malware threats affecting mobile devices in the enterprise.


Vitas Healthcare

Vitas Healthcare

“We felt that we were already protected because of the restrictions we had on the devices from a EMM perspective, but since deploying Wandera, we’ve learned about and fully understand some of the threats that get around EMMs such as mobile malware, different types of phishing attacks, leaking sites and apps and sideloaded apps. With hindsight, we can now see that Wandera is really protecting us from some of the risks that quite frankly we thought we were immune to.”

Patient health records are extremely valuable. As the healthcare industry digitizes more and more of its services it’s being increasingly targeted by hackers attempting to gain access to sensitive records. VITAS, the largest hospice care provider in the US, needed a solution to secure employee mobile devices in order to continue innovating while remaining secure.

Wedlake Bell

Wedlake Bell

“Firewall used to be the edge of your network, that was your perimeter. iPhones, you have to protect those like a PC and ultimately they spend most of their time outside your perimeter so a change of strategy is needed.”

This international law firm headquartered in the UK has been helping its clients in legal matters since 1780. Like many other organizations with a large number of knowledge workers, they have embraced the benefits of mobile working – lawyers can now access sensitive customer documents, look up legislation and edit files on the go. They need to be secured.

Mobile Phishing Report

This whitepaper looks at the evolution of mobile phishing – examining why and how people get phished. It explores the prevalence and severity of enterprise phishing techniques, providing actionable advice for how best to protect your mobile devices.

Latest phishing articles

someone doing their taxes

Watch out for HMRC tax rebate phishing scams

Tax season, the time of year you find out your filing system isn’t as organized as you thought and you’re left scrabbling around trying to find the necessary documents to…

What is spear phishing?

Hackers are becoming increasingly adept at creating links and landing pages that trick users into giving up their sensitive personal or organizational data. While many of these attacks are targeted…

Facebook phishing scams: how to spot and prevent them

Facebook has had a tough time lately: Cambridge Analytica (and others), disinformation campaigns, data breaches – the bad news seems to be coming thick and fast. Unsurprisingly the security of…

Selected threat advisories

iOS exploit

Suggested Contacts Vulnerability
June 2018

Qobuz app

PII leak, Credentials Leak
April 2018

RedDrop malware

Spyware, SMS Fraud, Data Exfiltration, 
Feb 2018

Experience Wandera yourself