Posts about MTD (15)

Zimperium’s Mobile Application Security Solution zIAP Wins Two Awards for Security Software

Zimperium
1 minutes
Oct 23, 2019
Zimperium’s zIAP solution won a Silver Award for Security Software Innovations at the 11th Annual Golden Bridge Awards, and a Silver Award for Security
Read Full Post

Protecting Your Mobile Devices with Workspace ONE and Zimperium MTD

MTD
1 minutes
Oct 23, 2019
In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium has partnered with the leading UEM
Read Full Post

Security and Privacy Issues Found in Popular Travel Apps

MTD
4 minutes
Oct 16, 2019
Planned your holiday travel just yet? Too soon? Not according to experts who told The Today Show the best time to book your Thanksgiving AND Christmas
Read Full Post

Top Three Mobile Phishing Lures: #3) SMS & Messaging Apps

MTD
1 minutes
Oct 16, 2019
According to Verizon’s Mobile Security Index 2019, “85% of phishing attacks seen on mobile devices take place outside of email. While many organizations
Read Full Post

Top Three Mobile Phishing Lures: #2) Malicious Apps

MTD
1 minutes
Oct 09, 2019
People are slowly learning to be careful about providing their credentials when prompted by an email or phone call, but hackers are getting more creative
Read Full Post

Zimperium Analysis of checkm8

MTD
4 minutes
Oct 03, 2019
Can you explain what checkm8 is?  On Friday, September 27th 2019, a security researcher known as @axi0mX publicly disclosed a vulnerability together with
Read Full Post

Zimperium Recognized with “Overall Mobile Security Solution of the Year” Award in 2019 CyberSecurity Breakthrough Awards

Zimperium
1 minutes
Oct 02, 2019
The CyberSecurity Breakthrough Awards announced today that Zimperium won “Overall Mobile Security Solution of the Year” award. CyberSecurity Breakthrough
Read Full Post

Top Three Mobile Phishing Lures: #1) Email

MTD
1 minutes
Oct 02, 2019
According to a SecurityWeek article, “With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing
Read Full Post