The iVerify Blog

The latest iVerify news, interviews, technologies, and resources.
February 14, 2024

Between a brick and a good place: making mobile security usable for humans

Lockdown Mode and iShutdown are valuable additions to the arsenal required to battle mercenary spyware. However, to truly protect the world’s mobile-first workforce at scale, we also need a solution that individual users can and will use.

December 6, 2023

Introducing iVerify Threat Hunter: Neutralize Zero Days Lurking in Your Mobile Fleet

Threat Hunter combines deep iOS and Android access, automated detection, and expert analysis to scale and expedite mobile forensics.

December 5, 2023

Ethical Principles for Mobile Threat Hunting

iVerify cofounders discuss how the company harmonizes security and privacy while conducting deep forensic investigations. Our approach is more than a philosophy; it drives the explicit methods we use to search for dangerous threats like mercenary spyware.

December 4, 2023

Mercenary Spyware is Open for Business. Are Enterprises Protected?

Mobile security solutions remain stuck in the past, relying heavily on management profiles that reduce device functionality and generate privacy concerns while offering little in the way of meaningful security. This has not gone unnoticed by hackers, who know that spyware can penetrate the mobile phones of corporate employees (or their unwitting family members) to access highly confidential corporate data.

November 29, 2023

Poisoned Apples – How Do We Find Them?

A talk by Matthias Frielingsdorf, VP of Research, presented at Objective by the Sea v6.0

November 13, 2023

Why is Mobile Spyware Hard to Detect?

Mobile spyware is hard to detect for several reasons. Jelmer De Hen (Head of Android R&D) and Rocky Cole (COO and Co-Founder) explain why and how iVerify goes toe-to-toe with the savviest malware developers.

October 12, 2023

To Catch a Predator, Turn on Developer Mode

Mercenary spyware is brazen, commonplace, and sophisticated. Fight back with Developer Mode. 

September 25, 2023

Encryption vs. Predator: How common security tools defeat commercial spyware

Mitigate MITM attack scenarios on unsecured traffic without degrading the user experience. Use iVerify to force HTTPS connections and deny unsecured HTTP connections.

September 13, 2023

Is Your Device Compromised by Spyware? Be the First to Know.

A recent iOS update from Apple brought attention to a new exploit used to deliver Pegasus spyware, but what if you could know if your device was compromised even before receiving the patch? In this post, iVerify COO Rocky Cole introduces robust mobile forensics to give customers the earliest possible warning of compromise.

August 24, 2023

Introducing iVerify, the first mobile threat hunting company

We are building the first mobile threat hunting company focused on countering the emerging mobile spyware threat.

August 24, 2023

iVerify Raises $4M to Take On the Growing Threat of Mercenary Spyware

iVerify is now an independent company dedicated to rooting out mobile spyware!

Security and privacy, now in harmony.

The go-to mobile security solution for individuals who want to know they can trust their devices with their most sensitive information – without sacrificing privacy.

Request a demo
Wired article featuring iVerify: Thousands of Android and iOS Apps Leak Data From the Cloud