Zimperium Blog

WhatsApp Buffer Overflow Vulnerability: Under the Scope

Android
10 minutes
Jun 14, 2019
Researcher: Chilik Tamir (@_coreDump)   Recently, Zimperium blogged about the new WhatsApp vulnerability disclosed by Facebook on May 13th. This
Read Full Post

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #1: Advanced, Purpose-Built Threat Detection

iOS & Android
1 minutes
Jun 11, 2019
Our first free webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” deals with Advanced,
Read Full Post

Take Heed: Latest Research Shows Mobile Banking Apps are Not Created Equal

iOS & Android
3 minutes
Jun 11, 2019
As banks encourage us to move our money to mobile banking apps and cashless formats for convenience and speed, so does the threat of cybercrime. Today,
Read Full Post

CVE-2019-8545: Vulnerability in IOHIDFamily.kext

Threat Research
1 minutes
Jun 10, 2019
Summary A local user may be able to cause unexpected system termination or read kernel memory. Details In the function
Read Full Post

Zimperium’s zIAP Wins 2019 Fortress Cyber Security Mobile Application Security Award

Zimperium
2 minutes
Jun 05, 2019
The Business Intelligence Group today announced Zimperium’s zIAP as the winner of the 2019 Fortress Cyber Security Mobile Application Security Award. This
Read Full Post

Zimperium’s Compliance Webinar Series: CCPA Compliance for Mobile Devices - The 60% of Endpoints Often Unprotected

Compliance
2 minutes
Jun 04, 2019
The California Consumer Privacy Act (CCPA) has been characterized as “the beginning of America’s General Data Protection Regulation (GDPR),” and its aim
Read Full Post

Another Day, Another App Breach

Zimperium
4 minutes
May 29, 2019
  They say it happens in threes. This time, the three are: Flipboard, the social sharing site and news aggregator, reset millions of user passwords
Read Full Post

BYOD Security | Employee Mobile Devices vs Your Network

MDM
3 minutes
May 28, 2019
It used to happen all the time. People actually carried a work phone and a personal phone. There used to be a real cost to how companies and their
Read Full Post