Zimperium Blog

Risky Apps: How They Can Pose Threats to Your Security

Zimperium
7 minutes
Apr 13, 2023
BYOD devices may include risky apps used for non-work purposes. These apps can create data protection risks that a mobile threat defense should address.
Read Full Post

Securing Medical Devices & Their Connected Digital Health Apps

Healthcare
4 minutes
Apr 04, 2023
Connected medical devices are in increasing demand. Learn how building secure FDA-compliant digital health apps is key to securing medical devices.
Read Full Post

Mobile Sypware Threats Put Businesses & Government Agencies at Risk

Threat Research
4 minutes
Mar 29, 2023
Learn how increasing mobile spyware threats threaten businesses & government agencies and how mobile threat defense solutions can provide protection.
Read Full Post

A Comprehensive Guide to Mobile App Security

iOS & Android
8 minutes
Mar 24, 2023
Learn about the most common mobile app attack vectors, how to prioritize mobile app security objectives, and development lifecycle best practices.
Read Full Post

Taxed Not Hacked: Protect Sensitive Tax Data from Cybercrime

Phishing
6 minutes
Mar 23, 2023
Sensitive financial data is shared online during tax season. Learn how to protect confidential tax information from cybercrime this tax season.
Read Full Post

New Apple Vulnerabilities Identified: Top Takeaways from Recent Discovery

iOS
5 minutes
Mar 09, 2023
New Apple vulnerabilities have been disclosed. Learn the details, our conclusions, and some important lessons about mobile application security.
Read Full Post

Lessons from The Recent Activision Hacker Attacks

Phishing
4 minutes
Mar 09, 2023
Activision has been the victim of several malicious attacks recently. Read the security lessons learned & how to protect your mobile gaming apps.
Read Full Post

Zimperium Honored with Three Cybersecurity Excellence Awards

Zimperium
2 minutes
Mar 07, 2023
Read about Zimperium’s 2023 Gold Winner Cybersecurity Excellence Awards in Mobile Application Security, Mobile Security, & Mobile Threat Defense.
Read Full Post