All posts tagged: cyber security

Chinese Hackers Reportedly Target Belgian Trade Mission

A recent Belgian economic mission to China was reportedly a target of multiple cyberattacks. According to multiple news reports, attacks were carried out at a hotel in Beijing where the convoy was staying. Hackers placed three mobile masts around the hotel to which all connections go, and targeted smartphones with […]

Read more

Protecting Your Mobile Devices with Workspace ONE and Zimperium MTD

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium has partnered with the leading UEM (unified endpoint management) providers, including VMware’s Workspace ONE, to deliver sophisticated threat protection for mobile devices. We are able to detect threats and work with UEMs to […]

Read more

Top Three Mobile Phishing Lures: #2) Malicious Apps

People are slowly learning to be careful about providing their credentials when prompted by an email or phone call, but hackers are getting more creative and tricking users into giving their credentials when users think they’re just signing into their mobile app.  For example, BankBot is Android-targeting malware using fake […]

Read more

Top Three Mobile Phishing Lures: #1) Email

According to a SecurityWeek article, “With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing actor, unprotected emails on a mobile device can easily turn into a new avenue for attack.”  Furthermore, it’s not just corporate email that […]

Read more

What exactly is a mobile ______ attack?

Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested to protect mobile device endpoints. Attackers work on the same model as any other business: where do they get the […]

Read more

5 Must-Have Sections For Every Enterprise Mobile Security RFP – Must-Have #5: Deployment Technology & Workflow Integrations

Our final webinar in our series of “The 5 Must-Have Sections for Every Enterprise Mobile Security Request For Proposal (RFP)” reviews Deployment Technology & Workflow Integrations, and took place on July 24, 2019. JT Keating, Vice President of Product Strategy and someone who has responded to literally hundreds of RFPs, led the session. […]

Read more