Challenges
With the development of mobile technologies, the security of smartphones has become as important as the security of servers or personal computers. Modern phones are devices used not only for telephone communication, but also for navigation, Internet browsing, or electronic payments. Their widespread use, also for business purposes, results in the need to verify their security against unauthorised access.
3,5 MM
malicious mobile applications identified in 2019
130 K
cases of the installation of stalkerware (programs designed to spy on private individuals)
43
countries in which the government-created malware Pegasus was detected
How can we help?
As part of the service, we conduct an analysis of network traffic looking for the presence of malware (e.g. communication with a C&C server, sending private data without the user’s knowledge). We analyse applications on the device for the presence of malware or other indicators of compromise left after malicious activities. If necessary, we can reverse engineer suspicious applications.
Benefits
detection of malware potentially running on devices
investigating attack evidence or unauthorised device access
preparation of recommendations regarding the safe use of mobile devices