Richard Melick

Richard Melick

Mobile Threat Intelligence

2022 Predictions: 5 Mobile Threats to Look for This Year

MTD
6 minutes
Nov 07, 2024
Recent years have made abundantly clear that attempting to predict what’s to come in the future can be a pretty dicey proposition. However, it is also
Read Full Post

Half-Year Review: Emerging Mobile Threats and Key Trends in 2022

Threat Research
6 minutes
Nov 08, 2023
As the saying goes, time is money. While this does remain true, I’d also argue data is money. The mobile phones we carry in our pockets have quickly come
Read Full Post

2022 Recap: The Top Mobile Security Stories from Last Year

Threat Research
9 minutes
Nov 07, 2023
Over the course of 2022, a number of significant mobile security stories emerged. These events had a big impact last year, and they will certainly shape the security landscape that we must navigate as we enter 2023. Here is our take on the top mobile security stories that emerged in 2022.
Read Full Post

Zimperium Mobile Threat Defence Delivers 99% Efficacy in Independent Tests: See the Report from AV-TEST

Zimperium
4 minutes
Jan 11, 2023
In recent independent testing from AV-TEST, Zimperium’s mobile threat defense solution, zIPS, delivered top-tier results—better than 99% accuracy in about all scenarios. Read on to find out more about the tests and how zIPS fared. 
Read Full Post

Mobile Attack Chains: The Real World Risks to Enterprise Security

Threat Research
6 minutes
Sep 28, 2022
Identifying a problem is a critical first step, but there can be a big leap between detecting an issue and fixing it. This is very much the case when it
Read Full Post

A Tale of Two Phishes: Lessons From The Twilio and Cloudflare SMS Spear Phishing Attacks

Phishing
6 minutes
Aug 19, 2022
As details emerge surrounding the spear phishing attacks against Twilio and Cloudflare, it remains clear how enterprises must continuously evolve their
Read Full Post

Mobile Security Is Critical: Verizon’s Refreshed Outlook on the Need for Mobile Threat Defense

MTD
4 minutes
Aug 03, 2022
61% of Global Organizations Suffered a Mobile Breach in the Last 12 Months As the modern workforce has evolved, so has the technology that is relied upon.
Read Full Post

4 Common types of Malware and What's the Difference (Trojan, Spyware, Viruses, Ransomware)

Threat Research
8 minutes
Aug 02, 2022
Malware is malicious code that threat actors use to compromise data collected, stored, processed, or transmitted by mobile devices, computers, servers, or
Read Full Post