The iVerify Blog
Clipping Wings: Our Analysis of a Pegasus Spyware Sample
Black Hat Asia 2024 Preview from iVerify VP of Research, Matthias Frielingsdorf
The Era of Mobile-First Zero-Days is Here
Google and Meta each recently released research reports focused on the pervasive and growing threat of mercenary spyware targeting mobile devices.
“I was so impressed, I bought the company”
CEO Danny Rogers shares his journey from iVerify customer to its top executive
Between a brick and a good place: making mobile security usable for humans
Lockdown Mode and iShutdown are valuable additions to the arsenal required to battle mercenary spyware. However, to truly protect the world’s mobile-first workforce at scale, we also need a solution that individual users can and will use.
Introducing iVerify Threat Hunter: Neutralize Zero Days Lurking in Your Mobile Fleet
Threat Hunter combines deep iOS and Android access, automated detection, and expert analysis to scale and expedite mobile forensics.
Ethical Principles for Mobile Threat Hunting
iVerify cofounders discuss how the company harmonizes security and privacy while conducting deep forensic investigations. Our approach is more than a philosophy; it drives the explicit methods we use to search for dangerous threats like mercenary spyware.
Mercenary Spyware is Open for Business. Are Enterprises Protected?
Mobile security solutions remain stuck in the past, relying heavily on management profiles that reduce device functionality and generate privacy concerns while offering little in the way of meaningful security. This has not gone unnoticed by hackers, who know that spyware can penetrate the mobile phones of corporate employees (or their unwitting family members) to access highly confidential corporate data.
Poisoned Apples – How Do We Find Them?
A talk by Matthias Frielingsdorf, VP of Research, presented at Objective by the Sea v6.0
Why is Mobile Spyware Hard to Detect?
Mobile spyware is hard to detect for several reasons. Jelmer De Hen (Head of Android R&D) and Rocky Cole (COO and Co-Founder) explain why and how iVerify goes toe-to-toe with the savviest malware developers.
To Catch a Predator, Turn on Developer Mode
Mercenary spyware is brazen, commonplace, and sophisticated. Fight back with Developer Mode.
Encryption vs. Predator: How common security tools defeat commercial spyware
Mitigate MITM attack scenarios on unsecured traffic without degrading the user experience. Use iVerify to force HTTPS connections and deny unsecured HTTP connections.
Is Your Device Compromised by Spyware? Be the First to Know.
A recent iOS update from Apple brought attention to a new exploit used to deliver Pegasus spyware, but what if you could know if your device was compromised even before receiving the patch? In this post, iVerify COO Rocky Cole introduces robust mobile forensics to give customers the earliest possible warning of compromise.
Introducing iVerify, the first mobile threat hunting company
We are building the first mobile threat hunting company focused on countering the emerging mobile spyware threat.
iVerify Raises $4M to Take On the Growing Threat of Mercenary Spyware
iVerify is now an independent company dedicated to rooting out mobile spyware!
Security and privacy, now in harmony.
The go-to mobile security solution for individuals who want to know they can trust their devices with their most sensitive information – without sacrificing privacy.
Request a demo