[Webinar] In-country Identification of Fraudulent and Unregulated Mobile Devices
In-country identification of fraudulent and unregulated mobile devices is a challenge for service providers in the mobile ecosystem.
In our efforts…
In-country identification of fraudulent and unregulated mobile devices is a challenge for service providers in the mobile ecosystem.
In our efforts…
Counterfeit devices are an enterprise cybersecurity threat.
Three parallel trends are now increasing the threats counterfeit devices pose to enterprise networks:
They are getting much better –…
Counterfeit devices are now a threat that app developers cannot afford to ignore. Why?
First of all, these devices deliberately misreport key characteristics that apps are…
Threat intelligence firm Check Point Research have released details of malware designed to exploit known Android vulnerabilities. It’s claimed to have…
Threatpost have released a fascinating interview with Joe Fitzpatrick, a researcher with Securing Hardware.
Prompted by last year’s Read More >>
In January, PCMag ran analysis of the Best Mobile Device Management Solutions of 2019. It begins with a statement that’s never…
The EU Intellectual Property Office was created in 1994 to oversee trademark and design protection issues across the 28 member states….
A growing problem, worldwide
Fake handbags, fake watches, fake news—these are all so familiar to us now that we don’t give them a moment’s thought and…
DUBLIN, BARCELONA February 24, 2019 – Launched today at Mobile World Congress, DeviceAssure is a new solution that uses patent pending technology to address…
18
counterfeits32
enterprise15
events6
financial services9
manufacturers11
online-brands11
regulators25
secondary-device-market13
security29
Uncategorized2