All posts tagged: Mobile Threat Protection

This webinar teaches how cybersecurity professionals rely on resources, such as NIST standards, to develop their mobile device security approach.

Sophisticated Fake Apps: A Growing Concern

Cybercriminals are employing increasingly sophisticated tactics to target unsuspecting users. One such tactic gaining traction is smishing – an attack that leverages text messages to deceive individuals into providing sensitive information or downloading malicious content. In this latest trend, cybercriminals create fake apps that mimic legitimate banking or financial services. […]

Read more

FBI Warns of Wi-Fi Attacks Targeting Teleworkers at Hotels Due to COVID

The Federal Bureau of Investigation (FBI) recently issued an announcement encouraging Americans to exercise caution when using hotel wireless networks (Wi-Fi) for telework. The announcement – in-part – states, “FBI has observed a trend where individuals who were previously teleworking from home are beginning to telework from hotels. US hotels, […]

Read more

Top 5 Mobile Security Stories of a Crazy 2020

2020 has been crazy… to say the least.  But in many ways, 2020 has thrust a huge spotlight on something we’ve known for quite some time – – mobile threats are real and mobile devices and apps need protection. It truly is crazy how many stories we’ve seen – and […]

Read more

Enhance App Shielding with In-App Protection

Mobile devices and the apps operating on them expose your backend systems to cyberattacks. Attackers exploit vulnerabilities in mobile operating systems and in your apps to spy on your users, grab their private data, or even steal their money. In response, many mobile app developers are using app shielding, sometimes […]

Read more

Unified Endpoint Security with VMware & Zimperium

We have said this many times: an endpoint is an endpoint is an endpoint. Today, users perform more than 80% of their daily work on mobile devices. These devices contain or have access to the same information and applications traditional endpoints (laptop, desktop) do.  Unfortunately, they also expose organizations to […]

Read more

Get started with Zimperium today