Mobile Applications
Mobile Application Security
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
Mobile Security Solutions by Industry
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
Company
About Us
Blog
Careers
Newsroom
Support
Partners
Partner Network
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
›
Mobile Security Solutions by Industry
›
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
›
Company
›
About Us
Blog
Careers
Newsroom
Support
Partners
›
Partner Network
Become a Partner
Richard Melick
Mobile Threat Intelligence
Posts
2022 Predictions: 5 Mobile Threats to Look for This Year
Half-Year Review: Emerging Mobile Threats and Key Trends in 2022
2022 Recap: The Top Mobile Security Stories from Last Year
Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST
Mobile Attack Chains: The Real World Risks to Enterprise Security
A Tale of Two Phishes: Lessons From The Twilio and Cloudflare SMS Spear Phishing Attacks
Mobile Security Is Critical: Verizon’s Refreshed Outlook on the Need for Mobile Threat Defense
4 Common types of Malware and What's the Difference (Trojan, Spyware, Viruses, Ransomware)
2022 Global Mobile Threat Report: Key Insights on the State of Mobile Security
BRATA Android Trojan Returns with Fury
Pegasus Spyware Resurfaces with Newly Revealed Zero-Click Vulnerability
IDC Research Validates Mobile Endpoints Are Under Attack
Pegasus Mobile Spyware used to target journalists, activists, and more
Sideloaded Applications: The Risk of Fewer Restrictions
Covering Mobile Endpoints in EPP: Zimperium partners with the most Gartner MQ leaders
Android Trojans Infect APKPure and Huawei App Stores
Gartner 2021 Market Guide for Mobile Threat Defense