Resources

Mobile Security Is National Security

Whether deployed to steal ammo for political scandals or classified documents for military sabotage, a cyberattack on a mobile device with access to sensitive information is a matter of national security. And yet, mobile devices are often left out of the national security conversation. Obama’s recently implemented Cybersecurity National Action […]

Read more

Browser-based CVE-2015-3864 Metasploit Module Now Available for Testing

By:Zuk Avraham Follow Zuk Avraham (@ihackbanme)Joshua Drake Follow Joshua Drake (@jduck) Last year, we disclosed a series of critical vulnerabilities within Android’s multimedia processing code — libstagefright. We promised to release the exploit for testing purposes and quickly published our exploit for CVE-2015-1538 targeting the Galaxy Nexus running Android 4.0.4. […]

Read more

Zimperium Partners with BlackBerry to Provide Mobile Threat Detection

I am very excited our strategic partnership with BlackBerry is gaining momentum. zIPS and BlackBerry’s Good Dynamics Secure Mobility Platform and BES12 are integrated to deliver enterprise and government customers with comprehensive mobile threat detection, risk analysis and prevention for both iOS and Android devices.  “Good Dynamics and BES12 integrated with Zimperium […]

Read more

Analysis of multiple vulnerabilities in different open source BTS products

Background By:Simone Margaritelli c Follow Simone Margaritelli (@evilsocket)        Zimperium zLabs Follow Zimperium zLabs (@zLabsProeject) During the last weeks we’ve been investigating multiple aspects of GSM security such as protocol vulnerabilities as well as source auditing the world’s most common open source software products that run GSM networks. In this post we’ll […]

Read more

What is Quadrooter?

‘Quadrooter’ is a group of four vulnerabilities affecting  specific Android devices leveraging the Qualcomm chipset and associated driver code. These four vulnerabilities are a small part of the 36 vulnerabilities reported from the same class of bug (privilege escalation) for the same vendor (Qualcomm) that were fixed as part of […]

Read more

Will the Real Hummer Trojan Please Stand Up?

Several researchers have reported on the discovery of Hummer Trojan, as one calls it, or HummingBad as another calls it. Another said it was also known as Shedun. Zimperium’s customers are safe from this recently discussed threat even before these threats were published. The attack was detected through our z9 […]

Read more

Zimperium Awarded Gold Status for Golden Bridge Awards®

We’re excited to announce that we recently earned the prestigious Gold status in the Golden Bridge Awards® for Mobile Security Solution – Innovations. The annual Golden Bridge Awards program encompasses the world’s best in every major industry. Categories include the following: organizational performance, innovations, products and services, executives and management […]

Read more

Pokémon Go: the Security Cost of Catching ’em All

For the past two weeks, full-grown adults, college students and children have all been roaming around the country in search of Pokémon (gotta catch ’em all, right?). This augmented reality mobile phenomenon has removed people from their home and encouraged them to explore their neighborhoods, but catching them all has […]

Read more

Zimperium Integrates With SAP to Enhance Mobile Security

We all understand why mobile cybersecurity is important. There are bad actors out there exploiting very vulnerable devices. Some debate the value of data on mobile devices based on situation but we all agree proprietary information needs to be kept secure. We recently announced an integration with SAP, the third […]

Read more

Get started with Zimperium today