Using only cloud sourcing as the basis for mobile threat defense is the wrong side of an attack. We respect the boldness of a competitor’s CEO taking on the leader in his market. In a very literal sense, he laid his and his company’s cards on the table. This is very good for current and … Read More
Posts in "Mobile Threat Defense"
Back in April of 2017, researchers discovered a new form of Android-targeting malware using fake overlay screens to mimic existing banking apps and steal user credentials. Distributed as benign apps in Google Play, BankBot-infected apps were posing as 20 entertainment and mobile banking apps. This first version of BankBot targeted a small number of institutions. In October … Read More
What is KRACK? KRACK (Key Reinstallation attaCKs, KRACKs) is a serious weakness in the WPA2 protocol. WPA2 secures all modern protected Wi-Fi networks including those used by smartphones. Attackers within physical range of a Wi-Fi network can exploit protocol weaknesses by using key reinstallation attacks. The attack works against all modern protected Wi-Fi networks and … Read More
Zimperium’s core machine learning engine, z9, has a proven track record of detecting zero-day exploits. We recently announced an extension of the framework that detects previously unknown mobile malware. This extension is known as “z9 for Mobile Malware”, and was officially announced in September 2017. Internally, the code name has been “Cogito”, so this research … Read More
Zimperium’s z9 technology and mobile threat defense is available for Microsoft Enterprise Mobility + Security deployments. Customers using Intune can receive threat intelligence from mobile devices and implement the risk-based conditional access policies popular with Intune deployments. John Michelsen has been leading the efforts with Microsoft and is excited to offer our technology to Intune … Read More