Zimperium Blog

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #3: Mobile Technology & Workflow Integrations

MTD
1 minutes
Jun 24, 2019
Our third webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” examined Mobile
Read Full Post

Cybersecurity and Mobility at the National Law Enforcement Museum

MTD
4 minutes
Jun 18, 2019
With 1 billion more mobile connections in the world than there are people in the world, it’s fair to say most people have a mobile device. Certainly,
Read Full Post

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #2: In-Depth Risk Analysis

MTD
1 minutes
Jun 18, 2019
Our second webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” looks at In-Depth Risk
Read Full Post

The Mobile Watering Hole: How A Sip Leads to A Trojan Compromise

Threat Research
67 minutes
Jun 17, 2019
"Watering Hole" is a cyber attack strategy in which the victim is a particular group (organization, industry, or region). In this attack, the attacker
Read Full Post

WhatsApp Buffer Overflow Vulnerability: Under the Scope

Android
10 minutes
Jun 14, 2019
Researcher: Chilik Tamir (@_coreDump)   Recently, Zimperium blogged about the new WhatsApp vulnerability disclosed by Facebook on May 13th. This
Read Full Post

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #1: Advanced, Purpose-Built Threat Detection

iOS & Android
1 minutes
Jun 11, 2019
Our first free webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” deals with Advanced,
Read Full Post

Take Heed: Latest Research Shows Mobile Banking Apps are Not Created Equal

iOS & Android
3 minutes
Jun 11, 2019
As banks encourage us to move our money to mobile banking apps and cashless formats for convenience and speed, so does the threat of cybercrime. Today,
Read Full Post

CVE-2019-8545: Vulnerability in IOHIDFamily.kext

Threat Research
1 minutes
Jun 10, 2019
Summary A local user may be able to cause unexpected system termination or read kernel memory. Details In the function
Read Full Post