You've requested...

Insights on the Rising Mobile Threat Landscape in 2024

If a new window did not open, click here to view this asset.

Download this next:

Cyber threat on the rise: Why enterprises need to be on red alert with text and mobile phishing

Last year’s Verizon data breaches report found that 80% of all cyber security attacks started with a phishing email. During the Covid-19 pandemic, cyber criminals have taken full advantage of the crisis with offers of fake payments, discounted tests, and vaccinations. At the coronavirus’s peak in 2020, Kaspersky identified more than 5,000 pandemic-related phishing websites.

The rise of mobile activities also made things easier for advanced phishing techniques, as the always-on lifestyle means users will remain online even when they're distracted or on the move.


In this e-guide, we take a look at how phishing can affect an enterprise, why text-based phishing is a growing threat and how to prevent and minimize mobile phishing attacks.

These are also closely related to: "Insights on the Rising Mobile Threat Landscape in 2024"

  • Enterprise mobility management software offerings and use cases

    Enterprise mobility management software allows IT to deploy security policies and provide access to internal resources by integrating with APIs in the mobile OSes. This e-guide shows enterprise mobility management software offerings and use cases.

  • Latest cybersecurity trends: Rise of RansomHub and new attack vectors

    The ESET Threat Report for H2 2024 provides an overview of the evolving cybersecurity landscape. Key findings include:

    • RansomHub becomes the leading ransomware-as-a-service after LockBit's disruption
    • Formbook surpasses Agent Tesla as the top infostealer
    • Cryptostealers grow significantly, driven by rising cryptocurrency values
    • A new attack vector targets mobile banking credentials, bypassing security
    • Investment scams using deepfake videos spread on social media
    • New accommodation booking scams target users of popular platforms

    The report also covers trends in Android threats, email-based attacks, and state-aligned cyberespionage groups. For detailed analysis, read the full report.

Find more content like what you just read:

  • Focus: Enterprise Mobility Management

    In this e-guide, we will explore exactly enterprise mobility management, looking in-depth at some of the key trends and developments in the world of enterprise mobility, as well as keeping a watchful eye on cybersecurity.

    Download

  • A guide to developing modern mobile applications

    A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

    Download

  • Managing Android devices in the enterprise

    This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).

    Download

  • How to take an Agile approach to mobile app development

    This Computer Weekly buyer's guide looks at how to take an Agile approach to mobile app development. Discover how to gain a competitive edge by accelerating mobile development, turning mobile users' expectations to your advantage, and building unique, differentiated mobile experiences.

    Download

  • How complacency kills mobile security

    In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.

    Download

  • Mobile security moving to a unified approach

    This e-guide offers expert insights into how the current trends in mobile security strategy are showing a move from mobile device management, to enterprise mobile management and unified endpoint management, which indicates a move towards a unified approach to mobile security.

    Download

  • Computer Weekly buyer's guide to mobile app development

    In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.

    Download

  • A Computer Weekly buyer's guide to secure and agile app development

    As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding

    Download

  • A Computer Weekly buyer's guide to perimeterless network security

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

    Download

  • The changing mobile platform landscape

    So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.

    Download

  • CW Europe – June-August 2019: Why are Dutch companies slow to take up the advantages of IoT?

    Rapid adoption of the latest technologies is not only being encouraged by governments, but driven by them. Being the first country to set up the ideal environment for a new technology has huge economic advantages.

    Download

  • Biometrics in the enterprise: An opportunity or an ethical minefield?

    Is biometric technology ready for use in the enterprise to help improve IT security? IT leaders need to be aware of the concerns. In this e-guide we take a look at some of the potential – as well as the risks.

    Download

  • Infographic: Zoom vs Teams vs Cisco

    While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.

    Download

  • Why Passkeys Improve User Security & How To Implement Them

    Passkeys offer a secure alternative to traditional passwords, reducing vulnerability to phishing and social engineering attacks. This white paper explores how passkeys work, their benefits over passwords, and best practices for implementation. Learn how passkeys can enhance security and user experience. Stay ahead in authentication technology.

    Download

  • A Computer Weekly buyer's guide to the future of collaboration

    Businesses are using collaborative software to operate in revolutionary new ways. In this 13-page buyer's guide, Computer Weekly looks at its potential negatives, the improved agility it provides and assesses Chromebooks as collaboration clients

    Download

  • A Computer Weekly buyer's guide to going beyond desktop Computing

    A digital workplace opens up a range of new possibilities for businesses, but it needs to be implemented in the right way. In this 13-page buyer's guide, Computer Weekly looks at how digital workplaces demand increasing functionality, how to make sense of desktop as a service, and the value of unified endpoint management.

    Download

  • Windows 10: How the client operating system is evolving

    A discussion about strategies for Windows 10 really boils down to the organisation's desktop IT strategy. Windows PCs account for the bulk of the personal computing market and the Windows client remains the dominant target platform for developers of client-side applications. In this e-guide, we look at the evolution of desktop IT.

    Download

  • Computer Weekly – 21 February 2017: How to develop mobile apps for business

    In this week's Computer Weekly, our latest buyer's guide examines the emerging innovations and best practice in mobile app development. We find out how Microsoft and Amazon are opening up their artificial intelligence tools to developers. And GE's CIO discusses the digital transformation of one of the world's industrial giants. Read the issue now.

    Download

  • A Computer Weekly Buyer's Guide to Microsoft Office 365

    Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.

    Download

  • Your Enterprise Browser Buyers Guide: Use cases, vendors, & more

    What is an enterprise browser? In essence, it’s optimized for end users but couples security controls to ensure data is properly protected. If you’re new to the concept, this buyers guide has you covered. Download a copy of this 27-page Enterprise Browser Buyers Guide to understand the enterprise browser inside and out.

    Download

  • 8 secure file transfer services for the enterprise

    Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.

    Download

  • CW Middle East ezine April 11 2019

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

    Download

  • Digital secure remote payment: How Apple Pay can change the future of remote payments

    Apple Pay introduces EMV cryptographic strength to remote payments for in-app payments on the iPhone and interconnected Apple devices. It has the potential to reduce card-not-present (CNP) fraud.

    Download

  • 103-page Report: Cybersecurity Takeaways and Tips

    In this 103-page research report by Check Point Software Technologies, access 2024 cybersecurity predictions, a timeline of cyber events in 2023, and much more.

    Download

  • Is the Netherlands keeping up with modern pace of digital change?

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

    Download

  • CW Europe – March 2017

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

    Download

  • Computer Weekly – 13 February 2018: On the path to diversity in tech

    In this week's Computer Weekly, after the UK celebrated 100 years of women's suffrage, we look at what more needs to be done to encourage greater diversity in IT to help tackle the ongoing skills shortage. We examine how mobile app developers can improve security. And we look at the role of containers in storage architecture. Read the issue now.

    Download

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

    Download

  • How to unlock the true value of data

    With a robust data architecture in place, a firm's data science team can turn raw data into business insight. We take a quick look at how this can be done.

    Download

  • Guide for aligning Google Workspace with CMMC Level 2

    This guide provides instructions for configuring Google Workspace to meet CMMC Level 2 requirements. It covers security controls, implementation steps, and best practices for protecting CUI in cloud environments. Learn to leverage Google Workspace features to enhance cybersecurity and achieve compliance. Read the full eBook for guidance.

    Download

  • Computer Weekly – 6 February 2018: How a digital workplace can drive innovation

    In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.

    Download

  • Computer Weekly - 6 July 2021: Where to start with Windows 11

    In this week's Computer Weekly, we look at the new features on offer from Microsoft's new version of its flagship operating system, Windows 11. Our latest buyer's guide examines the trends in secure, agile app development. And we find out what you need to consider when buying a VPN. Read the issue now.

    Download

  • Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software

    In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.

    Download

  • Endpoint and antimalware protection for small to large businesses

    Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

    Download

  • Discover key metrics to enhance your ecommerce performance

    This benchmark report explores key metrics for ecommerce success, including email CTR, app session frequency, stickiness quotient, and conversion rates. Learn to optimize your customer engagement strategy, from initial install to long-term retention. Read the full report to unlock insights for boosting your ecommerce performance.

    Download

  • Streamline SAP testing with AI-powered automation

    As enterprises migrate to SAP S/4HANA, extensive testing is crucial. This e-book explores how OpenText Functional Testing's AI-driven capabilities can help automate SAP testing, build resilient test assets, and reduce maintenance costs. Read the full e-book to learn more.

    Download

  • Mobile Payments Using Host Card Emulation with NFC

    In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.

    Download

  • Computer Weekly – 8 January 2019: Technology innovation in music

    In this week's Computer Weekly, we visit the first hackathon at Abbey Road Studios, once home to The Beatles, to find out how tech startups hope to revolutionise music creation. Our latest buyer's guide looks at perimeterless network security. And we look ahead to the key CIO skills and jobs trends for 2019. Read the issue now.

    Download

  • A guide to platform agnostic application delivery

    There is no single answer to the question of how to run applications independent of the underlying hardware. In this e-guide, we explore options for application virtualisation.

    Download

  • Free chapter: ITF+ CompTIA IT Fundamentals

    Download this sample chapter from ITF+ CompTIA IT Fundamentals to learn how to approach IT problems using a standard troubleshooting method, how to troubleshoot common computer problems and more.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • CIO Trends #8:Middle East

    In this e-guide we feature the small Island state of Bahrain and its efforts to make itself the go to fintech hub of the Middle East. On the subject of progressive ICT infrastructures this e-guide also looks at the rapid progress being made in Dubai as the government strives to make the city smart.

    Download

  • CIO Trends #8:Middle East

    In this e-guide we feature the small Island state of Bahrain and its efforts to make itself the go to fintech hub of the Middle East. On the subject of progressive ICT infrastructures this e-guide also looks at the rapid progress being made in Dubai as the government strives to make the city smart.

    Download

  • UCaaS buyers’ checklist: The most important features to know

    The best unified communications as a service (UCaaS) tools offer a range of transformative capabilities, from personalized meeting rooms to built-in security and encryption. Use this checklist to benchmark the most important features against your organization’s UCaaS requirements.

    Download

  • Live-video support tools: Changing the game for remote support

    With an explosion of IoT devices and continued growth of IT consumerization, market researchers see an opportunity for vendors with new-age remote support products. Uncover independent analysts' opinions of a live-video support tool and understand how it differentiates from competitors like Apple's FaceTime or Google Hangouts.

    Download

  • Computer Weekly Buyer's Guide to services for digitisation and IoT

    In this 13-page buyer's guide, Computer Weekly looksat the use of mid-sized nearshore IT service providers, choosing a cloud-based platform, and how to manage the huge volume of IoT data.

    Download

  • A Computer Weekly Buyer's Guide to Application Development and DevOps

    Harnessing the right developer tools offers new advantages for businesses. In this 14-page buyer's guide, Computer Weekly looks at the benefits and limitations of the DevOps approach, what Microsoft is doing with its developer platform and the rise of the holistic application.

    Download