Posts in "Mobile Threat Defense"

Protecting Your Mobile Devices with Workspace ONE and Zimperium MTD

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium has partnered with the leading UEM (unified endpoint management) providers, including VMware’s Workspace ONE, to deliver sophisticated threat protection for mobile devices. We are able to detect threats and work with UEMs to remediate risks and enforce policies. … Read More

Security and Privacy Issues Found in Popular Travel Apps

Planned your holiday travel just yet? Too soon? Not according to experts who told The Today Show the best time to book your Thanksgiving AND Christmas travel plans are before Halloween. After Halloween, fares go up, layover possibilities increase as does ending up in the middle seat.  The truth is, whenever you book travel – … Read More

Top Three Mobile Phishing Lures: #3) SMS & Messaging Apps

According to Verizon’s Mobile Security Index 2019, “85% of phishing attacks seen on mobile devices take place outside of email. While many organizations have filtering in place to block email-based attacks, far fewer have similar protection in place for these other routes.”  Furthermore, the Federal Trade Commission reported 93,000 complaints about unwanted texts in 2018, … Read More

Top Three Mobile Phishing Lures: #2) Malicious Apps

People are slowly learning to be careful about providing their credentials when prompted by an email or phone call, but hackers are getting more creative and tricking users into giving their credentials when users think they’re just signing into their mobile app.  For example, BankBot is Android-targeting malware using fake overlay screens to mimic existing … Read More

Zimperium Analysis of checkm8

Can you explain what checkm8 is?  On Friday, September 27th 2019, a security researcher known as @axi0mX publicly disclosed a vulnerability together with a working exploit called checkm8 (read “checkmate”). This permanent and unpatchable exploit leverages a vulnerability in Apple’s bootrom (read-only code; SecureROM), the initial and critical part in the secure boot chain. Every … Read More