top of page
Search

What Is An Ultra Secure Phone, and Do You Need It?
An ultra-secure Android phone is designed with security and privacy as a top priority. Some of the features that such a phone may have...
Noam Potter
Feb 14, 20232 min read
64 views
0 comments


Meltdown and Spectre - What Next?
Corporate enterprises face one of the biggest security risks of recent times: the “Meltdown” and “Spectre” critical vulnerabilities in...
Noam Potter
Jan 10, 20183 min read
116 views


Mobile cybercrime vectors: Zero-Day Attacks – not really zero-day
The mobile zero-day vulnerability is a disclosed mobile-software vulnerability that hackers can exploit to adversely affect mobile...
Noam Potter
Jun 7, 20162 min read
110 views


Secure communications with WhatsApp and Telegram? Think again
The arising mobile cybercrime drives mobile users to communicate via secure messaging services such as WhatsApp and Telegram, which claim...
Noam Potter
May 29, 20161 min read
341 views
0 comments
bottom of page