Challenges

With the development of mobile technologies, the security of smartphones has become as important as the security of servers or personal computers. Modern phones are devices used not only for telephone communication, but also for navigation, Internet browsing, or electronic payments. Their widespread use, also for business purposes, results in the need to verify their security against unauthorised access.

3,5 MM

malicious mobile applications identified in 2019

130 K

cases of the installation of stalkerware (programs designed to spy on private individuals)

43

countries in which the government-created malware Pegasus was detected

How can we help?

As part of the service, we conduct an analysis of network traffic looking for the presence of malware (e.g. communication with a C&C server, sending private data without the user’s knowledge). We analyse applications on the device for the presence of malware or other indicators of compromise left after malicious activities. If necessary, we can reverse engineer suspicious applications.

Benefits

image
detection of malware potentially running on devices
image
investigating attack evidence or unauthorised device access
image
preparation of recommendations regarding the safe use of mobile devices

Contact us - we will prepare an offer