451 Research Report

Enterprises are looking for BETTER Mobile Security for apps

BETTER Transforms iOS and Android Devices into an Enterprise First OS with Advanced Endpoint Security and Controls


New Mobile Threat Landscape

As corporations are embracing mobility for business, mobile devices became the new frontier for attacks.  However, MDM/EMM security alone cannot protect your organization from today’s advanced mobile threats. Learn More

Secure Any App On-Demand

BETTER’s App Shield allows corporations to add any enterprise security controls to any mobile app without any coding or wrapping. This includes native, third party, or homegrown apps. Learn More.

BETTER Mobile Threat Prevention

Our comprehensive mobile real-time threat prevention solution is the only platform to fill all of the security gaps left open by MDMs, EMMs, Containers, Wrappers, mobile Anti-Virus and more. Learn more.

Malicious Apps, MitM, and Other Mobile Threats

iPhones, iPads and other devices are at significant risk. Hackers are utilizing new and rapidly evolving methods of attack. Download our “Introduction to Zero Trust” white paper to learn how our next generation solution is protecting these devices. Learn More.

iOS Malware XcodeGhost Hits App Store and Leaves Hundreds of Thousands of Users Impacted

By | Mobile Security | No Comments


The Apple App Store has just been exposed to the largest attack we’ve seen to date. For the first time, dozens of trojanized apps have managed to bypass Apple’s App Vetting process and have been downloaded in the millions. These malicious apps range from popular social apps like: WeChat, to productivity tools such as WinZip.

What’s the Harm of XcodeGhost?

XcodeGhost is a malware that tricks people into providing sensitive information giving hackers access to private data. What makes this unique, is this Trojan was unknowingly inserted into the developer’s application during creation using a harmful Xcode build that had been repackaged by hackers. The malware has the ability to push dialogue notifications to your screen, which can potentially give attackers access to usernames, passwords, and personal information. Other malicious purposes include leading users to opening malicious mobile websites and installing harmful apps. Read More

URL Spoofing Bug Affects Millions of Android Devices

By | Mobile Security | No Comments
As a follow-up to my blog about Android devices and the Enterprise, we will cover in more depth the URL spoofing bug that will forever plague people running Jelly Bean and older Android OS’.

There is a vulnerability that is easy to exploit in the Android stock browser that enables an attacker to spoof the URL in the address bar and force the victim to visit a malicious site while believing they are visiting their intended target. Read More

New iOS Exploit Allows Attackers to Steal iCloud Usernames and Passwords

By | Mobile Security | No Comments
A security researcher has published attack code he said makes it easy to steal the iCloud usernames and passwords of people using the latest version of Apple iOS for iPhones and iPads.

The proof-of-concept attack uses a flaw in Mail.app, the default email application for iOS. Since the release of version 8.3 in April, the application has been unable to weed out potentially malicious HTML code from incoming e-mail messages. Read More