Wandera in the Media
April 2021 | Threat Technology
Zero Trust | Top Companies Providing Zero Trust Solutions
February 2021 | SC Media
Why SASE makes a difference for security teams as companies move to the cloud
December 2020 | techspective
Wandera Launches Wandera Private Access for Secure Remote Connectivity
December 2020 | Channel Buzz
Wandera unveils Wandera Private Access Zero Trust security solution
November 2020 | betanews
Zero Trust Network Access: Bringing trust to BYOD and remote work
November 2020 | techspective.net
Embracing SaaS Productivity Without Sacrificing Security
November 2020 | Security Boulevard
Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start
October 2020 | infosecurity
Mythbusters: Three Misconceptions About Zero Trust
September 2020 | Cult of Mac
iPhone owners race to upgrade to iOS 14
August 2020 | Tech Republic
Abandoned apps like TikTok pose a security risk in a BYOD world
July 2020 | Cyberwire
Microsoft is in talks to buy TikTok. US prosecutors charge three in the Twitter hack
June 2020 | Solutions Review
Key Findings: Gartner 2020 Market Guide for Zero Trust Network Access
June 2020 | Security Boulevard
Abandoned Mobile Apps Are a Security Problem, Research Finds
May 2020 | Forbes
10 iOS Security Tips to Lock Down Your iPhone
May 2020 | Infosecurity
Mal-Innovation on Mobile: A Changing Threat Landscape
May 2020 | Dark Reading
4 Challenges with Existing VPNs
April 2020 | CyberScoop
Scammers are abusing mobile ad networks in an attempt to phish Android app users
March 2020 | Consumer Reports
Choosing a VPN for Added Internet Security
February 2020 | CIO Dive
What 13 RSA Conference attendees want to know
February 2020 | TechNewsWorld
Mobile App Crashes Iowa Caucuses
February 2020 | ITProPortal
How can financial service institutions learn from past security mistakes?
February 2020 | Beta News
Mobile malware incidents increase by 142 percent
January 2020 | Security Boulevard
The Practical, Ethical, and Compliance Challenges of Data Privacy
December 2019 | Forbes
141 Cybersecurity Predictions For 2020
December 2019 | Infosecurity Magazine
Top Ten: Things We Learned in 2019
November 2019 | The Daily Express
Android warning: Here’s every dangerous app you need to delete from your phone immediately
November 2019 | Forbes
New Android Threat: Google Confirms Malicious Apps Removed From Play Store—Uninstall Now
October 2019 | ThreatPost
Apple Removes 17 Malicious iOS Apps From App Store
October 2019 | The Register
iBye, bad guy: Apple yanks 18 iOS store apps that sheltered advert-mashing malware
September 2019 | Wired
The Play Pass won’t solve Google’s big problem with dodgy apps
September 2019 | BBC
Why phones that secretly listen to us are a myth
August 2019 | Fortune
British Airways Has Yet Another Security Problem, New Report Says
August 2019 | USA Today
WiFi can be a free-for-all for hackers. Here’s how to stop them from taking your data
July 2019 | Ars Technica
My browser, the spy: How extensions slurped up browsing histories from 4M users
July 2019 | CSO
7 mobile security threats you should take seriously in 2019
June 2019 | ZDNet
Two-thirds of iOS apps disable ATS, an iOS security feature
June 2019 | Dark Reading
Healthcare Breach Expands to 19.6 Million Patient Accounts
May 2019 | SC Magazine
WhatsApp patches flaw allowing easy installation of Pegasus spyware
May 2019 | Business Insider
The WhatsApp hackers still have access to huge numbers of phones because people are not updating the app
April 2019 | Buzzfeed
Popular apps in Google’s Play Store are abusing permissions and committing ad fraud
April 2019 | Dark Reading
April 2019 | CyberScoop
The ‘permission’ question is much different for iOS and Android apps
April 2019 | ChannelBuzz
Wandera expands Microsoft partnership to broaden mobile security into other applications
April 2019 | Bank Info Security
Developing a Comprehensive Mobile Security Strategy
March 2019 | ZDNet
Enterprises lax about mobile security as more threats loom
March 2019 | CSO
What is malvertising? And how to protect against it
February 2019 | BBC
Google works on spotting dodgy ‘evil domains’
February 2019 | Dark Reading
Lessons From the War on Malicious Mobile Apps
February 2019 | CSO
February 2019 | Threatpost
February 2019 | SC Magazine
February 2019 | eWeek
February 2019 | Dark Reading
Some Airline Flight Online Check-in Links Expose Passenger Data
January 2019 | Forbes
How freaked out should you be about the Apple FaceTime eavesdropping bug?
January 2019 | Wall Street Journal
Popular Weather App Collects Too Much User Data, Security Experts Say
January 2019 | The Times
January 2019 | TechCrunch
Security researchers find over a dozen iPhone apps linked to Golduck malware
January 2019 | Forbes
January 2019 | Brian Madden
Did you know how easy it is to sideload iOS apps to your iPhone?!
December 2018 | TechTarget
December 2018 | SC Magazine
New secured phishing site goes up every two minutes
December 2018 | CSO
December 2018 | The Inquirer
Google promoted malware-ridden ‘games’ in Google Play’s trending section
December 2018 | Security Intelligence
As Mobile security challenges mount, how can CIOs and CISOs eliminate blind spots?
November 2018 | Brian Madden
November 2018 | Infosecurity Magazine
October 2018 | SC Magazine
October 2018 | Brian Madden
Real-world notes on deploying mobile threat defense
August 2018 | The Telegraph
Is Britain about to become a cashless society?
August 2018 | DarkReading
WhatsApp: Mobile Phishing’s Newest Attack Target
July 2018 | eWeek
IBM, Google Partner on Knative Open-Source Serverless Cloud Project
July 2018 | ZDNet
What… you didn’t waste mobile data usage on a cat?
June 2018 | BBC
Scammers abuse multilingual domain names
June 2018 | Dark Reading
Mobile app threats continue to grow
June 2018 | Fortune
It is mind-bogglingly easy to rope Apple’s Siri into phishing scams
June 2018 | SC Magazine
Drastic changes required to protect mobile users against cyber-attacks
June 2018 | ZDNet
Re-look at your mobile management, for the mobile evolution
May 2018 | SC Magazine
Android devices found with pre-installed malware
May 2018 | PC World
What is cryptojacking and how can you protect yourself from It?
May 2018 | SC Magazine
Fake Android AV app re-emerges
April 2018 | InfoRisk Today
Addressing the problem of mobile phishing
April 2018 | TechRadar Pro
How to protect against the world’s top cyberattack method – phishing
March 2018 | ComputerWeekly
Cloud key to cyber defence, says Palo Alto Networks
March 2018 | Sky News
Cyclists warned to beware sharing data on ride-sharing apps
March 2018 | SC Magazine
RedDrop malware runs up big bills on Android smartphones and spies on users
March 2018 | The Register
RedDrop nasty infects Androids via adult links, records sound, and fires off premium-rate texts
February 2018 | Forbes
Creepy New Android Malware Can Secretly Record Your Conversations
February 2018 | Medium
The next big thing in mobile? Here’s a clue: it’s not the next iPhone or Candy Crush sequel
February 2018 | Dark Reading
New Android malware family highlights evolving mobile threat capabilities