London and San Francisco, March 14, 2017 – Digital Shadows today announced new enhancements to its SearchLight digital risk management service helping organizations detect and respond to mobile application threats against their employees and consumers. SearchLight now offers identification of malicious and unsanctioned applications in official and third-party application stores. This new capability also identifies impersonated or spoofed mobile applications that could damage an organizations’ brands or compromise sensitive information. The new capability around mobile application protection extends the capabilities of Digital Shadows’ flagship service which monitors the Internet to identify digital risks to organizations, including cyber threats, data leakage, and reputational risks.
“Mobile is no longer a niche or isolated part of an organizations’ digital footprint. New devices and applications are the status quo and organizations must be able to identify the digital risks associated with them,” said Alastair Paterson, CEO and co-founder of Digital Shadows. “But we know that a large percentage of mobile applications will fail basic security tests and this digital risk presents enterprises everywhere with brand protection and data risk threats. In an increasingly mobile-first world, our customers now have the ability to precisely account for evolving threats jeopardizing irreplaceable reputations and information. “
Digital Shadows has been trialing the new service with some key clients and within one week, for just one financial services client, we identified 39 incidents of mobile applications posing a risk to their organization. This included mobile apps with malicious code, impersonation and unauthorized use of the company brand. While many of these came from third party application stores, some were from official stores.
With Digital Shadows’ mobile application monitoring, customers can detect a wide range of threats including: Suspect application behavior and code, such as self-signed certificates or the presence of malware; versions of application that have been modified by a third party; copies of application on stores that are not actively managed; impersonating or spoof application that mimic brands and affiliate links that mislead or confuse users. Monitoring even extends beyond customer mobile application, to internal company mobile apps.
Last year, the US Federal Trade Commission warned that ‘as more consumers are shopping with mobile apps, fraudsters are following the money. There are fake phone apps popping up that impersonate well-known retailers to steal your personal information. Their names were like well-known brands, and their descriptions promise enticing deals or features.
Updates to SearchLight and Digital Shadows’ capabilities include these enhanced features:
Mobile application monitoring is available to customers now. To learn more about the offerings please visit www.digitalshadows.com
About Digital Shadows
Digital Shadows provides insight into an organization’s external digital risks and the threat actors targeting them. The Digital Shadows SearchLight™ service combines scalable data analytics with human analysts to monitor for cyber threats, data leakage, and reputation risks. Digital Shadows continually monitors the Internet across the visible, deep and dark web, as well as other online sources to create an up-to-the minute view of an organization and provide it with tailored threat intelligence. The company is jointly headquartered in London and San Francisco. For more information, visit www.digitalshadows.com.
M: +44 (0) 755 7649 770