Posts about MAPS (13)

Latest Android Malware is Not a Surprise; Zimperium Customers Protected

Android
3 minutes
Jul 15, 2019
According to news reports, a new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module.  
Read Full Post

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #3: Mobile Technology & Workflow Integrations

MTD
1 minutes
Jun 24, 2019
Our third webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” examined Mobile
Read Full Post

5 Must-Have Sections For Every Enterprise Mobile Security RFP - Must-Have #1: Advanced, Purpose-Built Threat Detection

iOS & Android
1 minutes
Jun 11, 2019
Our first free webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” deals with Advanced,
Read Full Post

Take Heed: Latest Research Shows Mobile Banking Apps are Not Created Equal

iOS & Android
3 minutes
Jun 11, 2019
As banks encourage us to move our money to mobile banking apps and cashless formats for convenience and speed, so does the threat of cybercrime. Today,
Read Full Post

Zimperium’s zIAP Wins 2019 Fortress Cyber Security Mobile Application Security Award

Zimperium
2 minutes
Jun 05, 2019
The Business Intelligence Group today announced Zimperium’s zIAP as the winner of the 2019 Fortress Cyber Security Mobile Application Security Award. This
Read Full Post

Another Day, Another App Breach

Zimperium
4 minutes
May 29, 2019
  They say it happens in threes. This time, the three are: Flipboard, the social sharing site and news aggregator, reset millions of user passwords
Read Full Post

BYOD Security | Employee Mobile Devices vs Your Network

MDM
3 minutes
May 28, 2019
It used to happen all the time. People actually carried a work phone and a personal phone. There used to be a real cost to how companies and their
Read Full Post

Mobile Security Threats | Where's the Fire in Mobile Device Security?

MTD
3 minutes
May 09, 2019
Cybersecurity compromises are commonplace in the news, but rarely is it cited the compromise involved a mobile device. Attribution typically falls to
Read Full Post