Noam PotterMar 20, 20232 minMobile Privacy vs Mobile SecurityMobile privacy and security are closely related concepts, but they refer to different aspects of protecting your device and information....
Noam PotterFeb 14, 20232 minWhat Is An Ultra Secure Phone, and Do You Need It? An ultra-secure Android phone is designed with security and privacy as a top priority. Some of the features that such a phone may have...
Noam PotterJan 18, 20211 minWhatsApp tsunami The decisive (old) intent to unify Facebook and WhatsApp data has created a tsunami of resistance among users. It is resulting in a...
Noam PotterAug 8, 20184 minThe 7 Best Ways to Really Secure Your Enterprise Mobile PhoneThe truly security-sensitive organization cannot rely on BYOD programs. They need to run their operation via corporate-owned devices that ar
Noam PotterJan 10, 20183 minMeltdown and Spectre - What Next?Corporate enterprises face one of the biggest security risks of recent times: the “Meltdown” and “Spectre” critical vulnerabilities in...
Noam PotterJul 17, 20172 minThe Connected World as We Know It Has Changed ForeverWikiLeaks’ latest release focuses on malware called HighRise, which the agency used to target Android devices. WikiLeaks describes...
Noam PotterJun 7, 20162 minMobile cybercrime vectors: Zero-Day Attacks – not really zero-dayThe mobile zero-day vulnerability is a disclosed mobile-software vulnerability that hackers can exploit to adversely affect mobile...
Noam PotterMay 29, 20161 minSecure communications with WhatsApp and Telegram? Think againThe arising mobile cybercrime drives mobile users to communicate via secure messaging services such as WhatsApp and Telegram, which claim...