Zimperium, a global leader in enterprise mobile threat defense (MTD) and a leading provider of real-time, on-device protection against known and unknown mobile threats, hosted a series of webinars focusing on seven of the problem areas, or deadly sins, chief information security officers (CISOs) must address. Most organizations now realize that mobile devices are an unprotected endpoint … Read More
Posts in "Machine Learning"
Nicolás Chiaraviglio (@chiconara) We recently blogged about attacks perpetrated at WiFi networks in Barcelona before and during the 2019 Mobile World Congress (MWC). We found an astonishing amount: estimating more than 7,000 threats in less than four days. Furthermore, 25 percent of those threats were detected in hotels, and of those, 70 percent were at 5 Star Hotels. … Read More
Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo) Advertising and click fraud campaigns are one of the most common mobile malware-based monetization techniques. Although they are considered a lawful income source in most app markets, they can put the user’s privacy at risk and even cause economic damage. Once again, Zimperium’s machine-learning based solution, … Read More
Your App, Our Security: Zimperium Launches Latest Version of Machine Learning-Based Security for Mobile Apps
Zimperium is announcing the availability of the latest version of zIAP, our industry-leading, machine learning-based mobile security solution developed specifically to embed into existing mobile apps. Organizations who build mobile apps frequently struggle with how to successfully meet the critical need to protect sensitive data, reduce fraud and ensure security for mobile users. zIAP meets … Read More
Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo) Introduction Since the beginning of 2018, researchers in Zimperium’s zLabs have been tracking a rise in the frequency and sophistication of applications that have been loaded outside of the official Google Play Store. Many of these have leveraged social engineering techniques such as duplicate Play Stores. … Read More