Mobile Applications
Mobile Application Security
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
Mobile Device Security
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
Mobile Security Solutions by Industry
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
Company
About Us
Blog
Careers
Newsroom
Support
Partners
Partner Network
Become a Partner
CONTACT US
☰
Menu
Mobile Applications
›
Mobile Application Security
›
MAPS | Mobile Application Protection Suite
zScan | Automated Security Testing
zKeybox | Cryptographic Key Protection
zShield | Application Shielding
zDefend | Runtime Protection
Mobile Devices
›
Mobile Device Security
›
Mobile Threat Defense (MTD)
MTD for Chromebooks
zSecure Resident Safety
Mobile Phishing Protection
Mobile App Vetting
Mobile BYOD Security
Solutions
›
Mobile Security Solutions by Industry
›
Automotive
Aviation
Federal
Financial Services
Government
Media & Entertainment
Retail
Company
›
Company
›
About Us
Blog
Careers
Newsroom
Support
Partners
›
Partner Network
Become a Partner
Z Team
Posts
Zimperium Takes on Mobile World Congress 2015
Cutting through the Weekly Security Noise: Social, Payments and Apps Pose Big Enterprise Security Challenges in 2015
The Biggest Splash at BlackHat and DEFCON 2015
Detection of TowelRoot & Exploits of CVE-2014-3153
Analysis of iOS & OS X Vulnerability: CVE-2016-1722
Video: Zimperium takes over Nexus 6 using Stagefright
Zimperium Wins Telecom Council's ‘Most Disruptive Technology’ Award
Zimperium solution nominated for ‘Most Disruptive Technology’ by the Telecom Council
Stagefright wakes up the mobile eco-system
Stagefright: Vulnerability Details, Stagefright Detector tool released
How to Protect from StageFright Vulnerability
Experts Found a Unicorn in the Heart of Android
Protecting from Hacking Team’s Mobile APT
Top iOS Security Researcher Joins zLabs
Cutting Through The Weekly Mobile Security Noise: The Rise of Android Threats
Cutting Through The Weekly Mobile Security Noise: Data Breach Recap
Cutting Through The Mobile Security Noise: Breaches Come in all Shapes and Sizes
Cutting through the Weekly Mobile Security Noise: Evaluating Threats
Cutting Through The Weekly Mobile Security Noise: Finding the Balance
Cutting Through The Weekly Mobile Security Noise: Lesson Learned
Joshua Drake and Jimmy Shah join zLabs Advanced Research and Exploitation Team
Cutting through the Weekly Mobile Security Noise: Past, Present and Future Threats
Cutting through the Weekly Mobile Security Noise: The Top Breaches of 2015 (So Far)
Cutting through the Weekly Mobile Security Noise: Defending Data & Managing Risks
BYOD Changes the Game – Are You Ready to Play?
Cutting through the Weekly Mobile Security Noise: Shifting from B2C to B2B
Cutting through the Weekly Mobile Security Noise: Battling Breaches & Threats
Cutting through the Weekly Mobile Security Noise: Privacy threats - from the global to the personal
Cutting Through the Weekly Mobile Security Noise: Cybersecurity to own the national stage
Does Your BYOD Policy Allow Bad Apps
Cutting Through the Weekly Mobile Security Noise: We are all in this together
Millions impacted by infected Android Apps
Cutting Through the Weekly Mobile Security Noise: The Weakest Link
Is the White House Coming Up Short on Cybersecurity...
Cutting through the Weekly Mobile Security Noise: The State Of Cyber Security
Don't take a knife to a gunfight - the mobile security dilemma
Cutting through the Weekly Mobile Security Noise: The Year in Review and the Year Ahead in Security
The Real Mobile Threat Landscape
Cutting through the Weekly Mobile Security Noise
Legacy Mobile Security Solutions Leave Gaps
The Biggest Threat to Enterprises Comes on the Smallest Screen
2015 Mobile Security Predictions - Mobile Attacks Move Mainstream
DoubleDirect Discovers Full-Duplex ICMP Redirect Attacks in the Wild
Nation-state attacks exist on iOS
Shellshock – Find out if your mobile device is vulnerable
LinkedIn 0day Vulnerability Puts Your Data at Risk