aLTEr: POC Exploit of LTE Layer Two

Long Term Evolution (LTE) is the latest mobile telephony standard designed to bring many security improvements over the predecessor standard known as the Global System for Mobile (GSM). In a new research paper, security researchers from Ruhr-Universität Bochum and New York University Abu Dhabi outline attacks that could allow sophisticated hackers to spy on users’ … Read More

RAMpage: The Latest Rowhammer-esque Android Vulnerability

On June 28th, a group of eight academics across three different universities released a research paper outlining a new Android vulnerability called “RAMpage”.  It’s a variation of previous attacks that use the Rowhammer hardware vulnerability to run malicious code by changing what’s stored in a device’s memory (RAM) and has the potential of data loss … Read More

Don’t Get Caught in the Phishing Net – Webinar on July 11, 2018

Webinar will cover how phishing is evolving, the damages it causes, unique challenges presented to mobile users and how companies can protect against. Zimperium is hosting a webinar for customers, media and the general public. Zimperium executive, JT Keating, vice president of product strategy, will lead the webinar. WHO: Zimperium, a global leader in enterprise … Read More

Our Most Vulnerable Devices Are in Our Pockets

The smartphone continuously revolutionizes the way we work, stay connected and informed. Smartphone users now spend nearly 3 hours per day on their devices to send and download sensitive data and communicate with the office. However, the simplicity, ease and default behavior also makes mobile devices susceptible to tampering and hacking. Mobile devices do have … Read More