Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo) Advertising and click fraud campaigns are one of the most common mobile malware-based monetization techniques. Although they are considered a lawful income source in most app markets, they can put the user’s privacy at risk and even cause economic damage. Once again, Zimperium’s machine-learning based solution, … Read More
Posts in "Mobile Malware"
Analysis & Post By: Alex Calleja (@alximw) Matteo Favaro (@fvrmatteo) Introduction Since the beginning of 2018, researchers in Zimperium’s zLabs have been tracking a rise in the frequency and sophistication of applications that have been loaded outside of the official Google Play Store. Many of these have leveraged social engineering techniques such as duplicate Play Stores. … Read More
Webinar: Why One of the World’s Largest Independent Energy Companies Is Implementing Mobile Threat Defense
Webinar reveals why leading critical national infrastructure enterprises are implementing mobile threat defense. Zimperium is providing mobile security for electric utilities and other critical national infrastructure (CNI) enterprises. Customers, media and the general public watching the live webinar will discover why mobile devices are a security risk to these enterprises. Zimperium executive, JT Keating, vice … Read More
Webinar displays thousands of mobile threats Zimperium detected and how mobile devices are being used for surveillance and data theft. Zimperium is providing mobile threat data for customers, media and the general public via a live webinar. Zimperium executive, JT Keating, vice president of product strategy, will lead the session and answer questions. WHO: Zimperium, … Read More
Skygofree, another in the long line of Android based spyware, is being touted as one of the most advanced targeted surveillance tools ever seen on mobile devices. Skygofree is designed to enable surveillance and full device control by remote attackers. On unprotected mobile devices, Skygofree allows attackers to perform advanced attacks including location-based sound recording, … Read More