All posts tagged: mobile devices

Webinar: The State of Mobile Device Security in Government

Webinar to highlight emerging mobile cybersecurity threats facing state and local governments, and what these entities can do to better protect mobile data. Zimperium is hosting a webinar for customers, media and the general public. Karen Jackson, Former Secretary of Technology for the Commonwealth of Virginia, along with Chul Yim, […]

Read more

Webinar: Device Detection – To Cloud or Not to Cloud

Webinar to discuss the pros and cons of both on-device detection and detection in the cloud and the many ways on-device detection outweighs the cloud in protecting mobile data and stopping cyberattacks. Zimperium is hosting a webinar for customers, media and the general public. Zimperium executive, JT Keating, vice president of […]

Read more

The New zANTI: Mobile Penetration & Security Analysis Toolkit

zANTI is an easy to use penetration testing and a security analysis toolkit. With zANTI you can simulate real-world, commonly-used malicious cyberattack techniques. Using zANTI, you will quickly discover unsafe elements in your networks, and in your devices that are connected to those networks. Using zANTI, you will understand unsafe conditions on your devices in three […]

Read more

Webinar: Compliance and The Forgotten Endpoint

Zimperium, the global leader in enterprise mobile security, will host a webinar titled, “Compliance and Mobile Devices:  The Forgotten Endpoint.” Organizations in practically every industry, including financial services, retail, healthcare and more, are required to meet cybersecurity compliance requirements set by federal and state regulators. Penalties for non-compliance include massive fines […]

Read more

Dissecting mobile native code packers. A case study.

As mobile malware advances to the levels of desktop malware, it’s not uncommon to stumble upon protected APKs while analysing malware. Most of the times, the sample is simply obfuscated via classes/variables name stripping from the DEX file and/or strings obfuscation; but other times several layers divide the researcher from […]

Read more

Jailbreak versus Compromise…

We see a lot of confusion in the market about precisely what it means to jailbreak a device–and that confusion could lead to serious problems, especially regarding a hacker performing a jailbreak to attack a device. The security industry is notoriously full of acronyms, buzzwords and generally opaque jargon. Here at […]

Read more

Mobile Device Threat Data – Q1 2017

14% of Devices Contain Malware 4% detected a Man-in-the-Middle Attack 1 of 3 Devices Not Running Latest Version Mobile devices are now standard computing platforms in businesses of all sizes. U.S. consumers now spend over 5 hours per day on mobile devices [1]. The average time spent per day on […]

Read more

Zimperium zLabs is Raising the Volume: New Vulnerability Processing MP3/MP4 Media.

By:Zuk Avraham Follow Zuk Avraham (@ihackbanme)Joshua Drake Follow Joshua Drake (@jduck)Nikias Bassen Follow Nikias Bassen (@pimskeks) Following our discovery of vulnerabilities in the Stagefright library in April, Zimperium Mobile Threat Protection, zLabs VP of Research Joshua J. Drake continued researching media processing in Android. His continued research, which focused on remote […]

Read more

What Verizon Missed in the Latest Threat Report

By: Zuk Avraham, Joshua Drake, Yaniv Karta, Jimmy Shah (To download the detailed report, click here) Recently, Verizon published a report that says that malware on mobile is not an issue. We strongly suggest Verizon and other enterprises not underestimate the scale of one percent. The sheer number of mobile […]

Read more

Get started with Zimperium today