According to The Wall Street Journal’s article Apple Loses Bid to End App Antitrust Case in Supreme Court, “Consumers can sue Apple Inc. for forcing them to buy apps exclusively from the tech giant, the Supreme Court ruled Monday, threatening billions of dollars in revenue that the company is counting on to make up for … Read More
Posts in "Mobile Threat Defense"
Cybersecurity compromises are commonplace in the news, but rarely is it cited the compromise involved a mobile device. Attribution typically falls to vulnerabilities, social engineering, or data left in the open. With no mention of mobile devices, the perception is mobile devices are secure. In other words, there’s no smoke, so there’s no perceived fire … Read More
First in a series of four blogs on mobile device security Mobile devices – used today for everything from corporate and personal email access to tools used for company production – are very powerful computers. In fact, over the past several years, the rate of accessing the Internet via mobile devices has increased dramatically versus laptop and … Read More
The challenge with explaining something new is making that new thing relatable to something someone else already knows and understands. This is why the definition of endpoint security is so often misunderstood or mislabeled. Many compare endpoint security to antivirus protection because it is the easiest way to explain the concept. The truth is antivirus … Read More
We’ve all seen them. They are annoying; can be abusive and sometimes malicious. It goes something like this: You’re navigating a web page to read an article on your mobile phone. Just as you start to read, the whole page is redirected. A full screen ad announces you’ve just won $1,000! Lucky you! Not really. … Read More