New Webinar
Mobile Threats: Is that really your app?

How many mobile apps does your company have?

With the volume of mobile apps popping up in app stores across the world—many due to the rise in mobile app fraud, this may not be such a simple question to answer. Cybercriminals are leveraging the simplicity of creating and launching copycat apps to perform any number of fraudulent activities, from stealing credentials and delivering malware to selling knockoff versions of merchandise.

View the recording to see RiskIQ engineer and mobile threat expert, Chad Salisbury give examples of real mobile attacks we’ve found and show you how to discover and prevent mobile fraud in your organization. He chats with Sal Tripi, AVP Digital Operations & Compliance at Publishers Clearing House, about how RiskIQ helps PCH's security maintain brand trust with customers across the mobile ecosystem.

During the webinar you will learn:

  • Methods hackers use to carry out attacks on mobile applications and in mobile app stores
  • The best way to detect unauthorized apps to shut them down
  • The mobile defense techniques an organization must employ to prevent credential harvesting, malware, download diversion, user experience damage, and non-compliant official apps

View the Recording

ChadSalisburyHeadshot.jpg
Chad Salisbury, 
Senior Sales Engineer,
RiskIQ
rsz_1salblog-821x1024.jpg
Sal Tripi,
AVP Digital Operations & Compliance,
Publishers Clearing House