Posts in "Mobile security"

Webinar Series: The Mobile Menaces Most Wanted List

Series of seven free webinars will review the most common mobile menaces and the best ways to detect and stop them. In the mobile security world, what can’t be seen can often cause the biggest issues. In August and September, Zimperium will be hosting a webinar series, “The Mobile Menaces Most Wanted List”. The series will … Read More

The Silicon Review Awards Zimperium with “10 Fastest Growing Cyber Security Companies 2018”

Zimperium is honored to be listed on The Silicon Review’s “10 Fastest Growing Cyber Security Companies 2018” list. In the magazine’s July issue, they featured Zimperium in an article where the discussed the unique features that sets Zimperium apart from competitors. The article states, “The Zimperium Mobile Threat Defense (MTD) platform provides continuous, on-device monitoring and … Read More

How To Protect Billions Against Mobile Banking Fraud: Open Your Eyes!

Webinar to discuss how banking organizations can secure their mobile banking apps while not impacting the user experience. Zimperium is providing banking organizations with the solution needed to protect mobile applications in order to give visibility into protecting billions of dollars against mobile banking fraud. Zimperium executive, JT Keating, vice president of product strategy, will … Read More

Zimperium Webinar: State of Mobile Device Threats

Webinar displays thousands of mobile threats Zimperium detected and how mobile devices are being used for surveillance and data theft. Zimperium is providing mobile threat data for customers, media and the general public via a live webinar. Zimperium executive, JT Keating, vice president of product strategy, will lead the session and answer questions. WHO: Zimperium, … Read More

RAMpage: The Latest Rowhammer-esque Android Vulnerability

On June 28th, a group of eight academics across three different universities released a research paper outlining a new Android vulnerability called “RAMpage”.  It’s a variation of previous attacks that use the Rowhammer hardware vulnerability to run malicious code by changing what’s stored in a device’s memory (RAM) and has the potential of data loss … Read More