All posts tagged: Enterprise Mobility and Security

How to Protect from StageFright Vulnerability

Earlier this week, Zimperium (@ZIMPERIUM), the leader in mobile threat protection, unveiled a major vulnerability in Android – Stagefright. Joshua Drake (@jduck), VP of Platform Research and Exploitation and a senior member of Zimperium zLabs, proactively studied the code. According to a few firms, other people have identified vulnerabilities in […]

Read more

Protecting from Hacking Team’s Mobile APT

While the world was going through the emails and exploits that Hacking Team’s leak revealed, we tested our mobile threat protection solution with one of the most advanced attack mechanisms. The result? Zimperium customers are safe from Hacking Team’s attacks, without any engine update! Hacking Team used advanced mobile APT […]

Read more

Zimperium customers are safe from Samsung Keyboard Security Risk

A potential security risk has been discovered on a large number of Android Smartphones as discovered by Nowsecure. Some of the latest devices, such as Samsung Galaxy S6, and Galaxy S5, come pre-loaded with a third-party keyboard app, SwiftKey, which fetches an update over unsecure and invalidated channel. This allows the […]

Read more

Zimperium Raises $12M in Series B Funding Led by Telstra

We are excited to announce that Zimperium raised $12M in Series B Funding. This is a major milestone for Zimperium and is a testament to the quality of the Z-Team, the products we develop and the customers we have in place successfully using Zimperium’s Mobile Threat Defense. 2014 was a […]

Read more

Telegram App Store Secret-Chat Messages in Plain-Text Database

EDIT: The following post * was not on a rooted or jailbroken device *. In order to access the plain-text secret-chat database containing the messages, we used our implementation of CVE-2014-3153. The claims that the device is rooted / jailbroken are incorrect and misleading. I will start by quoting CryptoFail […]

Read more

Does Your BYOD Policy Allow Bad Apps

BYOD policies enable economies of scale but also introduce vulnerabilities to the enterprise. Many employees unknowingly bring malicious apps to work compromising identities and enabling conduits for spies. But what is the effect of BYOD on enterprise security? What are the best-practice BYOD security policies for organizations looking to embrace […]

Read more

Get started with Zimperium today