Posts about iOS & Android (49)

Cutting through the Weekly Mobile Security Noise: Shifting from B2C to B2B

Zimperium
3 minutes
Mar 20, 2015
This week we’ve been tracking a number of stories involving high-profile data breaches, Yahoo’s new security protocol and the “USB killer.” While concerns
Read Full Post

Cutting through the Weekly Mobile Security Noise: Battling Breaches & Threats

Zimperium
3 minutes
Mar 14, 2015
As the battle against cyber security and online threats continues, we’ve been monitoring conversations around how security trends impact organizations and
Read Full Post

Cutting through the Weekly Mobile Security Noise: Privacy threats - from the global to the personal

Zimperium
4 minutes
Feb 27, 2015
This week we learned that when it comes to cyber security, no one is safe. From larger corporations such as Microsoft, to individual consumers, everyone’s
Read Full Post

Zimperium Raises $12M in Series B Funding Led by Telstra

Zimperium
2 minutes
Feb 26, 2015
We are excited to announce that Zimperium raised $12M in Series B Funding. This is a major milestone for Zimperium and is a testament to the quality of
Read Full Post

Telegram App Store Secret-Chat Messages in Plain-Text Database

Threat Research
9 minutes
Feb 23, 2015
EDIT: The following post * was not on a rooted or jailbroken device *. In order to access the plain-text secret-chat database containing the messages, we
Read Full Post

Cutting Through the Weekly Mobile Security Noise: Cybersecurity to own the national stage

Zimperium
3 minutes
Feb 13, 2015
This week we saw an attempt from the federal government to put a little more wood behind its arrow in pursuit of effective ways to monitor and combat
Read Full Post

Does Your BYOD Policy Allow Bad Apps

Zimperium
1 minutes
Feb 11, 2015
BYOD policies enable economies of scale but also introduce vulnerabilities to the enterprise. Many employees unknowingly bring malicious apps to work
Read Full Post

Cutting Through the Weekly Mobile Security Noise: We are all in this together

Zimperium
4 minutes
Feb 07, 2015
This week in cyber security we have seen that in the face of attacks from seemingly every angle the best way to fight back and move forward may be as a
Read Full Post