Posts in "Mobile Threat Defense"

Detecting Unknown Threats Time After Time

Zuk Avraham, Founder Follow Zuk Avraham (@ihackbanme) Last week, Ian Beer, from the Google Project Zero research team, released his local elevation of privileges exploit targeting iOS 10.1.1 [1]. We immediately understood that we had another opportunity to assess a new zero day exploit against our Machine-Learning attack and exploit detection engine – z9 z9 … Read More

Zimperium users are safe from Gooligan

Zimperium users are safe from Gooligan. A new threat, called Gooligan, which is a family of Android-based malware, has compromised more than 1M Google accounts — and many of those are enterprise users. “Not surprisingly, a malware, spread in unofficial markets, can create real damage,” said Zimperium founder and CTO, Zuk Avraham. Gooligan fully compromised the … Read More

Zimperium Awarded Gold Status for Golden Bridge Awards®

We’re excited to announce that we recently earned the prestigious Gold status in the Golden Bridge Awards® for Mobile Security Solution – Innovations. The annual Golden Bridge Awards program encompasses the world’s best in every major industry. Categories include the following: organizational performance, innovations, products and services, executives and management teams, women in business, public … Read More

Stagefright: One Year Later

It’s been exactly one year since Joshua J. Drake, our zLabs VP of Platform Research and Exploitation, disclosed Stagefright — one of the worst Android vulnerabilities to date. Stagefright impacted nearly 1 billion Android devices total, and up to 850 million devices remain vulnerable as of March 2016. Stagefright gives attackers, armed with only a … Read More

Privacy vs. Security

If you think about it, practically every type of security product in the market provides security through surveillance. Surveillance is the act of keeping a close watch over someone or something in order to prevent or detect. In law enforcement it’s looking for crime but in an IT sense it’s monitoring for cyber activity. Either … Read More