Resources

Shellshock – Find out if your mobile device is vulnerable

Today a new vulnerability was discovered called “Shellshock,” that targets BASH, a popular software widely used to control the command prompt on many *nix computers. Shellshock has the potential to wreak havoc on websites, web servers, PCs, routers and more because it enables hackers to gain complete control of an […]

Read more

JPMorgan Hacked: Wake Up Call For Enterprises to Secure Endpoints

Why $250 million didn’t protect JPMorgan from hackers… Late last month CBS Nightly News reported about a robbery at American’s biggest bank, JPMorgan. This attack was no ordinary hold-up. JP Morgan Chase fell victim to a targeted cyberattack, despite spending $250 million dollars on cybersecurity. According to the information disclosed […]

Read more

zANTI 2.0 Released – Completely free (no credit required)

After 3 years of work, we are excited to release zANTI 2.0 – completely free for community usage. Android Network Toolkit (zANTI 2.0) is an award-winning mobile penetration testing toolkit that enables IT Security managers and Pentesters to perform complex security audits and simulates advanced hackers’ capabilities in an organization’s […]

Read more

Security Limitations in Smartphones

In our previous blog post, we wrote about what’s planned for 2014. Since we’re aiming to change the world of mobile security, maybe a good place to start is to describe the security limitations on smart devices. Like a computer, right? Often, people think that mobile device security is exactly […]

Read more

LinkedIn 0day Vulnerability Puts Your Data at Risk

Today, corporate networks and websites face varying degrees of cyber-threats – ranging from widespread well-publicized threats like the recent Heartbleed bug, to those that are less well-known, but just as damaging, like “Man-in-the-Middle” (MITM) attacks. The latter cyber-threat threats are network attacks that allow hackers to intercept users’ internet communication, […]

Read more

Detection of TowelRoot & Exploits of CVE-2014-3153

  Today we had the opportunity to see the engine of zIPS our Mobile IPS in action on a newly published vulnerability. As a reminder, we prefer complex problems, hence security on mobile devices is where we can think of out of the box ideas to solve security problems while […]

Read more

How 2014 is going to be Z-Year

ZIMPERIUM recently announced a Series A fund-raising round of $8 Million. This will allow us to support all organizations demanding a change in current mobile security offerings; they are seeking advanced, next-generation security protection comparable to what you would expect in today’s sophisticated enterprise networks, but a solution which protects […]

Read more

Get started with Zimperium today