top of page
Search

Mobile Privacy vs Mobile Security
Mobile privacy and security are closely related concepts, but they refer to different aspects of protecting your device and information....
Noam Potter
Mar 20, 20232 min read
49 views
0 comments

What Is An Ultra Secure Phone, and Do You Need It?
An ultra-secure Android phone is designed with security and privacy as a top priority. Some of the features that such a phone may have...
Noam Potter
Feb 14, 20232 min read
64 views
0 comments


WhatsApp tsunami
The decisive (old) intent to unify Facebook and WhatsApp data has created a tsunami of resistance among users. It is resulting in a...
Noam Potter
Jan 18, 20211 min read
92 views


The 7 Best Ways to Really Secure Your Enterprise Mobile Phone
The truly security-sensitive organization cannot rely on BYOD programs. They need to run their operation via corporate-owned devices that ar
Noam Potter
Aug 8, 20184 min read
266 views


Meltdown and Spectre - What Next?
Corporate enterprises face one of the biggest security risks of recent times: the “Meltdown” and “Spectre” critical vulnerabilities in...
Noam Potter
Jan 10, 20183 min read
116 views


The Connected World as We Know It Has Changed Forever
WikiLeaks’ latest release focuses on malware called HighRise, which the agency used to target Android devices. WikiLeaks describes...
Noam Potter
Jul 17, 20172 min read
102 views


Mobile cybercrime vectors: Zero-Day Attacks – not really zero-day
The mobile zero-day vulnerability is a disclosed mobile-software vulnerability that hackers can exploit to adversely affect mobile...
Noam Potter
Jun 7, 20162 min read
110 views


Secure communications with WhatsApp and Telegram? Think again
The arising mobile cybercrime drives mobile users to communicate via secure messaging services such as WhatsApp and Telegram, which claim...
Noam Potter
May 29, 20161 min read
341 views
0 comments
bottom of page