The Real Mobile Threat Landscape

What Is a Mobile Threat? The sophistication and continuous evolution of advanced threats is a serious problem for modern enterprises. Mobile malware, malicious apps, targeted data-stealing attacks on iOS and Android devices are introducing new challenges for IT security. Like viruses and malware that can infect your PC, there are a variety of security threats … Read More

Cutting through the Weekly Mobile Security Noise

Introducing Our New Blog Series: Cutting through the Weekly Mobile Security Noise The worlds of mobile and security generate news at a breakneck pace. And when you operate at the intersection of those two markets, like Zimperium, it can be overwhelming to process what’s happening on an hour-to-hour basis. That’s why we’re unveiling our weekly … Read More

Legacy Mobile Security Solutions Leave Gaps

Complete Visibility to Traffic is Key to Delivering True Mobile Security Legacy approaches to securing mobile devices only solve pieces of the mobile security problem. Enterprises need to adopt a true security solution optimized for mobile that provides complete visibility and protection against known and unknown threats. Ideally, this solution should detect threats even without … Read More

The Biggest Threat to Enterprises Comes on the Smallest Screen

Criminals may not have physical access to your device – but that won’t stop them from hacking your device remotely to steal sensitive and confidential data. The BYOD revolution is here to stay and enterprises need to adopt mobile security best practices that can help prevent cyberattacks like Shellshock, WireLurker, and now DoubleDirect. iOS and … Read More

DoubleDirect – Zimperium Discovers Full-Duplex ICMP Redirect Attacks in the Wild

By: Esteban Pellegrino, Zuk Avraham, Patrick Murray and Rachel Ackerly. Zimperium Mobile Security Labs have investigated during the last year a dangerous type of attack technique in the wild being exploited by attackers. Aptly named “DoubleDirect,” this attack is a type of “Man-in-the-Middle” attack (MITM) enabling an attacker to redirect a victim’s traffic to the … Read More