Read about the lastest Mobile Security news and get tips to protect your enterprise mobile endpoints.| blog.pradeo.com
Last week, multiple investigations have confirmed that three journalists based in Europe were targeted using Graphite, a powerful spyware tool developed by Israeli company Paragon Solutions. According to findings reported by Citizen Lab, the attacks involved a zero-click exploit on iOS, allowing full compromise of the devices without user interaction. This new case sheds light on the growing sophistication of mobile spyware and the increasing risk it poses far beyond the journalism world. Whi...| Pradeo Blog
Strava enabled journalists to anticipate the future movements of political figures such as Emmanuel Macron, Joe Biden, and Vladimir Putin.| blog.pradeo.com
U.S. Customs and Border Protection, were using a cloned and modified version of the Signal app.| blog.pradeo.com
Pradeo, a leader in mobile cybersecurity, is launching Yagaan, the next generation of its web and mobile application security suite.| blog.pradeo.com
Data protection, digital sovereignty, GDPR compliance: trust a leading European cybersecurity provider.| blog.pradeo.com
AI, the new tool of cybercriminals: dark web, phishing, malware… Discover how cybersecurity is adapting to face these emerging threats.| blog.pradeo.com
Researchers have recently discovered SparkCat, a malware that targets smartphone users by exploiting their screenshots to extract sensitive data. This malicious program was recently detected in applications available on the App Store and Google Play, highlighting the limitations of these platforms’ security controls.| Pradeo Blog
The CNIL has published a set of recommendations aimed at strengthening mobile application security and protecting users' personal data.| blog.pradeo.com
Mobile Security for SMBs allows small IT teams to secure their smartphones and tablets easily, without administrative burdens.| blog.pradeo.com
Effective from October 2024, the European NIS2 Directive aims to enhance the protection of critical infrastructures against cyberattacks.| blog.pradeo.com