Noam PotterFeb 14, 20232 min readWhat Is An Ultra Secure Phone, and Do You Need It? An ultra-secure Android phone is designed with security and privacy as a top priority. Some of the features that such a phone may have...
Noam PotterJan 10, 20183 min readMeltdown and Spectre - What Next?Corporate enterprises face one of the biggest security risks of recent times: the “Meltdown” and “Spectre” critical vulnerabilities in...
Noam PotterJun 7, 20162 min readMobile cybercrime vectors: Zero-Day Attacks – not really zero-dayThe mobile zero-day vulnerability is a disclosed mobile-software vulnerability that hackers can exploit to adversely affect mobile...
Noam PotterMay 29, 20161 min readSecure communications with WhatsApp and Telegram? Think againThe arising mobile cybercrime drives mobile users to communicate via secure messaging services such as WhatsApp and Telegram, which claim...