Currently browsing: Mobile Security

Legacy Mobile Security Solutions Leave Gaps

Complete Visibility to Traffic is Key to Delivering True Mobile Security Legacy approaches to securing mobile devices only solve pieces of the mobile security problem. Enterprises need to adopt a true security solution optimized for mobile that provides complete visibility and protection against known and unknown threats. Ideally, this solution […]

Read more

Is Your Mobile Device Putting Your Company at Risk?

The Three Ways Your Mobile Device is Putting Your Company at Risk The explosion of mobile devices has changed the way people live and work. Enterprises want to take advantage of the productivity benefits mobile devices present without compromising an organization’s sensitive IP. With more business being conducted on the […]

Read more

Shellshock – Find out if your mobile device is vulnerable

Today a new vulnerability was discovered called “Shellshock,” that targets BASH, a popular software widely used to control the command prompt on many *nix computers. Shellshock has the potential to wreak havoc on websites, web servers, PCs, routers and more because it enables hackers to gain complete control of an […]

Read more

zANTI 2.0 Released – Completely free (no credit required)

After 3 years of work, we are excited to release zANTI 2.0 – completely free for community usage. Android Network Toolkit (zANTI 2.0) is an award-winning mobile penetration testing toolkit that enables IT Security managers and Pentesters to perform complex security audits and simulates advanced hackers’ capabilities in an organization’s […]

Read more

Security Limitations in Smartphones

In our previous blog post, we wrote about what’s planned for 2014. Since we’re aiming to change the world of mobile security, maybe a good place to start is to describe the security limitations on smart devices. Like a computer, right? Often, people think that mobile device security is exactly […]

Read more

LinkedIn 0day Vulnerability Puts Your Data at Risk

Today, corporate networks and websites face varying degrees of cyber-threats – ranging from widespread well-publicized threats like the recent Heartbleed bug, to those that are less well-known, but just as damaging, like “Man-in-the-Middle” (MITM) attacks. The latter cyber-threat threats are network attacks that allow hackers to intercept users’ internet communication, […]

Read more