Hello World!Read More >
We, Mocana, went around IoT World for 80…no, for 2 days, and had a grand old time. It was a packed house and a packed booth. There is currently so much buzz and energy around the IoT space, it is almost palpable. We had the benefit of having our booth right at the center of the floor, close to the main IoT World stages. This helped with foot traffic in general, and also made it easier for our partners and clients to find us. We had many vendors stop by who heard about us directly through our customers who told them they use our solution and came out of curiosity just to see what we were all about. We must have looked extra approachable, as we got this one very intelligent man who wrote a textbook (did not know textbooks still existed!) for industrial electronics. He wanted to add an IoT section to bring the book up to date for classes and wanted to collaborate with us to write that. I should have suggested to use this blog as a main resource; after all, it is written by the most brilliant minds in IoT security. Click here for our Industrial IoT whitepaper.Read More >
Mocana is taking on IoT! After our press release with Avaya on April 18, 2016, the Avaya team posted a blog about how their partnership with Mocana is enabling them to increase security assurances for the internet of things. Our FIPS certified cryptographic engine has been key to aiding clients expand their reach to government organizations.Read More >
Team Mocana seized the day and some swag (as one of our engineers put it) a week and a half ago at the Samsung Developer Conference in San Francisco’s Moscone Center. I walked into the office on Monday morning and saw one of our engineers decked out in a Samsung sweater, holding a Samsung bag, using a Samsung umbrella, and covering himself in a Samsung blanket, that I thought it worthy enough to dedicate an entire blog post to.Read More >
Malware is everywhere this week, as displayed from our featured articles. From mobile banking apps, to Bible and Quran apps, no application, regardless of its type, is exempt from malware or hacks.
Hackers are blending old and new methods to find innovative ways to steal personal information from you. Are you protected from these efforts?Read More >
The proliferation of connected devices and ghost security means continued flawed security for mobile.
It is projected that 50 million smart devices are going to be sold over the holiday season alone!
Where are these smart devices going to be bought? Why, from smartphones, of course!Read More >
App and tech security breaches have run amuck this week. Hackers are tapping into more and more diversified outlets in order to steal users' information. One in particular, was using an APK installation under the guise of a Microsoft Word document.
Before installing anything on your phone (even if it's on an app), be wary of its origin.Read More >
To summarize many of these articles, there is a "lack of priority in mobile security." (see first article below)
As mobile devices become more integrated into our daily lives, it is essential we address the problems that lack of proper security poses to our personal and professional lives.
Both Apple and Android well as many apps that run on those platforms have proven security risks and flaws.Read More >