Video-Demo-Tour

Ask us


I agree to the terms of the Privacy policy
I agree with the provisions on data protection. I agree that Protelion will process the personal data provided by me electronically for the processing of my request and contact me, according to my explicit request, for the processing of my request. I can revoke my consent at any time with effect for the future.

Your request was sent successfully.
We’ll answer you as soon as possible.

OK

Home

/
 ... / 

Resources

/
 ... / 
Blog

Blog

Blog
The persistent security crisis in mobile networks: old vulnerabilities keep haunting new generations
21.10.2025
This article is based on research «Unveiling the Ghosts of Mobile Networks: When Will Old Bugs Die?»
Blog
SNMP Security
18.10.2025
SNMP (Simple Network Management Protocol) consists of 3 essential parts
Blog
ArmoredMobile team reflections on Pixnapping attack
16.10.2025
The malicious app’s attack works by opening the target app (e.g., Google Authenticator), then displaying its own window on top of the target app’s window, and scanning the content pixel by pixel, analyzing the execution time of graphic operations on each pixel.
Blog
Privacy vs. Security: Finding the Balance in an Increasingly Connected World
07.10.2025
From unlocking your phone with a glance to moving through an airport security gate, technology quietly collects pieces of our lives.
Blog
SNMP: Simple Network Management Protocol
16.09.2025
Simple Network Management Protocol (SNMP) works on the application layer of the OSI Reference Model, to manage and control network devices.
Blog
IoT Security: How Smart Devices Open Doors for Hackers
05.09.2025
Smart homes, wearable devices, connected cars, the Internet of Things (IoT) is everywhere. From fitness trackers to smart fridges, these devices make our lives easier and more connected. But with convenience comes risk: every smart device is a potential entry point for hackers.
Blog
MDM: Mobile Device Management
18.08.2025
The development of mobile devices and wireless technologies in recent years has revolutionized the way we work and communicate. The growing use of these technologies makes mobile devices one of the main targets of cyber threats.
Blog
Why Systems Are Vulnerable — and Why It Matters to Fix Them
12.08.2025
No system is perfect. Whether it’s a hospital’s patient database, a bank’s online platform, or the apps we use daily, every system has weak spots. These weaknesses, or vulnerabilities are what cybercriminals look for. And the truth is, they don’t need to target you personally. They can scan thousands of systems at once, waiting for one to give them easy access.
Blog
VoIP Security
28.07.2025
As the popularity of telephony via the Internet, or VoIP grows, there are growing concerns about communication security. In this sense, as VoIP is a technology that is necessarily supported by many protocols and equipment of data networks, it inherits certain security problems that they present, with some threats being most important to VoIP classic security problems affecting the world of data networks.
More blogs