All posts by Z Team

Avatar photo
Author: Z Team

Posts by Z Team:

Millions impacted by infected Android Apps

Millions of Android users have been impacted recently by malware masquerading as a card game called Durak, an IQ test and a history app. The discovery was made by Avast security researcher, Flip Chytry. The malware contains fake ads that pop-up whenever an unsuspecting user unlocks their device. The ads […]

Read more

Is the White House Coming Up Short on Cybersecurity…

As millions watched the State of the Union address on Tuesday night, I know many of us in the cyber industry were interested to see if, and how, cybersecurity would be addressed. The subject has finally hit the mainstream media, movies, magazines and now the national stage! This is a […]

Read more

Don’t take a knife to a gunfight – the mobile security dilemma

Zimperium is growing with more customers, partners and most recently, more talent! We’re pleased to announce the appointment of John Michelsen to the role of Chief Product Officer, CPO. John will be working closely to manage our development and product roadmap to continue our commitment to excellence for our enterprise […]

Read more

The Real Mobile Threat Landscape

What Is a Mobile Threat? The sophistication and continuous evolution of advanced threats is a serious problem for modern enterprises. Mobile malware, malicious apps, targeted data-stealing attacks on iOS and Android devices are introducing new challenges for IT security. Like viruses and malware that can infect your PC, there are […]

Read more

Cutting through the Weekly Mobile Security Noise

    Introducing Our New Blog Series: Cutting through the Weekly Mobile Security Noise The worlds of mobile and security generate news at a breakneck pace. And when you operate at the intersection of those two markets, like Zimperium, it can be overwhelming to process what’s happening on an hour-to-hour […]

Read more

Legacy Mobile Security Solutions Leave Gaps

Complete Visibility to Traffic is Key to Delivering True Mobile Security Legacy approaches to securing mobile devices only solve pieces of the mobile security problem. Enterprises need to adopt a true security solution optimized for mobile that provides complete visibility and protection against known and unknown threats. Ideally, this solution […]

Read more

Get started with Zimperium today