Currently browsing: Machine Learning

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole […]

Read more

To Be…Protected, or not To Be…Protected. That is the Question.

These last few days could have CIOs and CISOs very nervous. Two news stories about mobile devices pose real threats for enterprises around the world: From Forbes, “millions of shiny new Android smartphones are being purchased with dangerous malware factory-installed, according to Google’s own security research team.” Also from Forbes, […]

Read more

Malicious WiFi Connections: Welcome to RSA Conference 2019

Nicolás Chiaraviglio (@chiconara) We recently blogged about attacks perpetrated at WiFi networks in Barcelona before and during the 2019 Mobile World Congress (MWC). We found an astonishing amount: estimating more than 7,000 threats in less than four days. Furthermore, 25 percent of those threats were detected in hotels, and of those, 70 percent […]

Read more

Your App, Our Security: Zimperium Launches Latest Version of Machine Learning-Based Security for Mobile Apps

Zimperium is announcing the availability of the latest version of zIAP, our industry-leading, machine learning-based mobile security solution developed specifically to embed into existing mobile apps. Organizations who build mobile apps frequently struggle with how to successfully meet the critical need to protect sensitive data, reduce fraud and ensure security […]

Read more

Fake Play Market: Zimperium’s z9 against Social Engineering Attack Vectors

Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo) Introduction Since the beginning of 2018, researchers in Zimperium’s zLabs have been tracking a rise in the frequency and sophistication of applications that have been loaded outside of the official Google Play Store. Many of these have leveraged social engineering techniques […]

Read more