Blog

18
Apr
2017
  • Reflections on the evolution of Mobile Access Control

Reflections on the evolution of Mobile Access Control

No Tags | Blog

It really was much simpler back in the days for IT departments… I’m talking, of course, about when blackberry ruled, and there was one single paradigm of mobile access to corporate data – the blackberry way. It was cool, and innovative, and therefore RIM reign was absolute. The BYOD term wasn’t coined until later, but […]

Read More
09
Apr
2017

Behind the scenes of Apple’s latest security update and what it has to do with Google and Broadcom

No Tags | Blog

Early last week Apple released iOS 10.3.1, a security update to patch a critical vulnerability in apple device’s Wi-Fi mechanism. A day later, a post by a Google’s Project Zero researcher gave some more background on this vulnerability. Yes, the same vulnerability affects mobile devices, whether iOS or Android. So, what is it about? Why […]

Read More
02
Feb
2017

Need to build a mobile security wall? Visit Kaymera at RSA and Mobile World Congress

No Tags | Blog

There has been a lot of discussion in the world’s media recently about President Trump continuing to use a personal, unsecured Android mobile phone, especially to maintain his flow of regular Twitter messages.  This article in the UK’s Daily Telegraph highlighted research from Android Police which suggested that the President’s personal phone is a Samsung Galaxy S3, […]

Read More
19
Jan
2017

The most secure Android phone ever? Introducing Kaymera’s Secured Pixel

No Tags | Blog

Google’s flagship Pixel phone was one of the most hotly anticipated smartphone releases of 2016, and immediately achieved a raft of top reviews from leading publications.  It was developed to respond to increasing fragmentation in the Android ecosystem, which has led to long updates and patching cycles, and in turn creates multiple potential security vulnerabilities […]

Read More
06
Dec
2016

Don’t be paranoid about Android

No Tags | Blog

Android devices are proving a rich hunting ground for malicious hackers. Since August, more than a million of them worldwide have been infected with Gooligan malware, probably via an app downloaded from a porn site or third-party app store. Once Gooligan is downloaded onto an Android smartphone, it is able to ‘root’ the device, gaining […]

Read More
Request a Demo