ZIMPERIUM-logo_orangeZ_ff4c15_white
  • Mobile Applications
    • Mobile Application Security
      • MAPS | Mobile Application Protection Suite
      • zScan | Automated Security Testing
      • zKeybox | Cryptographic Key Protection
      • zShield | Application Shielding
      • zDefend | Runtime Protection
  • Mobile Devices
    • Mobile Device Security
      • Mobile Threat Defense (MTD)
      • MTD for Chromebooks
      • zSecure Resident Safety
      • Mobile Phishing Protection
      • Mobile App Vetting
      • Mobile BYOD Security
  • Solutions
    • Mobile Security Solutions by Industry
      • Automotive
      • Aviation
      • Federal
      • Financial Services
      • Government
      • Media & Entertainment
      • Retail

     

     

  • Company
    • Company
      • About Us
      • Blog
      • Careers
      • Newsroom
      • Support
    • Partners
      • Partner Network
      • Become a Partner

    Screenshot 2024-10-09 at 2.42.53 PM

     

CONTACT US
☰

Menu

Mobile Applications ›
Mobile Application Security ›
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices ›
Mobile Device Security ›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions ›
Mobile Security Solutions by Industry ›
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company ›
Company ›
About Us
Blog
Careers
Newsroom
Support
Partners ›
Partner Network
Become a Partner
Richard Melick

Richard Melick

Mobile Threat Intelligence

Posts

  • 2022 Predictions: 5 Mobile Threats to Look for This Year
  • Half-Year Review: Emerging Mobile Threats and Key Trends in 2022
  • 2022 Recap: The Top Mobile Security Stories from Last Year
  • Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST
  • Mobile Attack Chains: The Real World Risks to Enterprise Security
  • A Tale of Two Phishes: Lessons From The Twilio and Cloudflare SMS Spear Phishing Attacks
  • Mobile Security Is Critical: Verizon’s Refreshed Outlook on the Need for Mobile Threat Defense
  • 4 Common types of Malware and What's the Difference (Trojan, Spyware, Viruses, Ransomware)
  • 2022 Global Mobile Threat Report: Key Insights on the State of Mobile Security
  • BRATA Android Trojan Returns with Fury
  • Pegasus Spyware Resurfaces with Newly Revealed Zero-Click Vulnerability
  • IDC Research Validates Mobile Endpoints Are Under Attack
  • Pegasus Mobile Spyware used to target journalists, activists, and more
  • Sideloaded Applications: The Risk of Fewer Restrictions
  • Covering Mobile Endpoints in EPP: Zimperium partners with the most Gartner MQ leaders
  • Android Trojans Infect APKPure and Huawei App Stores
  • Gartner 2021 Market Guide for Mobile Threat Defense

Make mobile security
your first priority.

Contact Us
  • Products
    • Mobile Threat Defense
    • Mobile Application Security
  • Industries
    • Automotive
    • Aviation
    • Financial Services
    • Government
    • Media & Entertainment
    • Retail
  • Company
    • About Us
    • Careers
    • Contact Us
    • Newsroom
  • Privacy
    • Privacy Policy
    • Compliance Hotline
    • Responsible Disclosure Policy
Get the latest Mobile Security News and Updates in your inbox:
Subscribe

© 2025 Zimperium. All Rights Reserved.   Privacy Settings   Modern Slavery Act Statement

© 2025 Zimperium. All Rights Reserved.

Privacy Settings

Modern Slavery Act Statement