All posts by JT Keating

Avatar photo
Author: JT Keating
Strategic Initiatives. View the author's experience and accomplishments on LinkedIn.

Posts by JT Keating:

Top 5 Mobile Security Stories of 2019

Mobile security has certainly seen its fair share of headlines in 2019 prompting individuals and enterprises to realize mobile devices are another endpoint – like laptops and computers – in need of protecting. I thought it would be fun to look back at some of those stories that helped propel […]

Read more

Gartner 2019 Market Guide for Mobile Threat Defense

“Security leaders should integrate the MTD solution with their incumbent UEM tool. Where devices must stay unmanaged, security leaders should use MTD to protect the enterprise infrastructure.” –                                  Gartner “Market Guide for Mobile Threat […]

Read more

Privacy and Security Issues Found in Popular Shopping Apps

Just in time for Black Friday, Cyber Monday and the holiday shopping season, we investigated the most recent versions* of 30 of the leading, well-known mobile shopping applications to see how the application providers protect users from security and privacy risks.  The results based on our Advanced Application Analysis z3A […]

Read more

Security and Privacy Issues Found in Popular Travel Apps

Planned your holiday travel just yet? Too soon? Not according to experts who told The Today Show the best time to book your Thanksgiving AND Christmas travel plans are before Halloween. After Halloween, fares go up, layover possibilities increase as does ending up in the middle seat.  The truth is, […]

Read more

Malicious Websites Put iOS Devices At Risk

In an excellent and deep blog analysis, Ian Beer of Google’s Project Zero outlines five separate iOS exploit chains that were found on a small collection of hacked websites. The hacked sites were being used in indiscriminate watering hole attacks against their visitors, using iOS 0-day. (For another watering hole […]

Read more

Zimperium Customers Protected From Monokle Malware

According to Threatpost, another new malicious Android app – dubbed “Monokle”- is gaining attention. While Monokle has some interesting capabilities (e.g., making extensive use of Android accessibility services to exfiltrate data and predictive-text dictionaries to understand a target’s interests), it is still basically another malicious app. Monokle is a highly-targeted […]

Read more

BYOD Security | Employee Mobile Devices vs Your Network

It used to happen all the time. People actually carried a work phone and a personal phone. There used to be a real cost to how companies and their employees used their digital devices. Now, with inexpensive and unlimited use cellular plans, the financial concerns of using a personal device […]

Read more

Get started with Zimperium today