Global mobile and internet security specialists across both private and public sectors
Mobile security technology is the primary area of interest and development right now, and for the foreseeable. Specific areas of mobile security development would include, device firmware, mobile payments, HTML5 apps and the cellular network. ID Theft Protect is approached by a number of global security focussed start-up and mid-start-ups in any given year.
Desktop PC-based malware/viruses are still a major threat but the mobile threat is also very real. ID Theft Protect is working with Windows OS/Phone, Firefox OS, Android, iOS and BlackBerry BB10 platforms on researching current and future threats as well as vulnerabilities. We have also introduced a robust Android application filtering and approval process for developers submitting apps to the Play Store.
One specific area of our research is mobile malware dynamic analysis. Understanding how to dynamically monitor the behaviour of the malware sample isn't too difficult but the difficult area of the analysis is how do to trigger the malware. We are currently investigating solutions to this and many more problems.
There are many security solutions for desktop and mobile security. Our expertise focusses on Internet Security, anti-fraud, Unified Threat Management (UTM), Mobile Device Management (MDM), Mobile Application Management (MAM), encryption, mobile development security, dynamic and static malware analysis. ID Theft Protect works in all these and other areas of interest.
The ad networks (and publishers) are vulnerable to having their products and services (I.e. URLs, IP blocks/servers) incorrectly classified as suspicious by AV vendors. It is known that false positives cause serious loss of core business revenue to ad companies. ID Theft Protect works with the ad networks and publishers to help them comply with the AV vendors classifications.
The following is an example of how easy it is to steal your identity and commit identity fraud. Remember it’s not identity fraud until a fraudster actually uses your stolen data. All you need to appropriate your good name is your full name, address, date of birth, partners name, directorships of companies etc. This and more is all public information. (UK readers only)
Here is a simple scenario of why you should open your junk mail:
You arrive home and decide to open your junk mail.
You notice junk mail from a bank – a bank loan (normally monthly payments for a fixed...
ID Theft Protect provides technical and business evaluation of security technology as well as Internet and mobile security specialist knowledgebase in mobile and Internet security. We are not consultants as such, as we have a history of designing and building security technology.
We also work from time-time with security start-ups and stealth companies - these types of companies actually contact us for help and guidance! Julian and Matt also attend various global events includes Virus Bulletin, AVAR, CARO, AMSTO, CEBIT, RSA, Black Hat and Infosecurity Europe to name a few.