Resources

Zimperium Analysis of checkm8

Can you explain what checkm8 is?  On Friday, September 27th 2019, a security researcher known as @axi0mX publicly disclosed a vulnerability together with a working exploit called checkm8 (read “checkmate”). This permanent and unpatchable exploit leverages a vulnerability in Apple’s bootrom (read-only code; SecureROM), the initial and critical part in […]

Read more

Zimperium Recognized with “Overall Mobile Security Solution of the Year” Award in 2019 CyberSecurity Breakthrough Awards

The CyberSecurity Breakthrough Awards announced today that Zimperium won “Overall Mobile Security Solution of the Year” award. CyberSecurity Breakthrough is a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market today.  Our machine learning-based engine, z9, has detected 100 percent […]

Read more

Top Three Mobile Phishing Lures: #1) Email

According to a SecurityWeek article, “With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing actor, unprotected emails on a mobile device can easily turn into a new avenue for attack.”  Furthermore, it’s not just corporate email that […]

Read more

Augmenting Intune with Zimperium’s MTD

According to our latest State of Enterprise Mobile Report, mobile devices continue to be the target of attack at increasing rates. There is a relatively simple explanation for this – in a typical organization today, 60 percent of the endpoints containing or accessing enterprise data are mobile; the majority of […]

Read more

My Four Truths (So Far) Regarding Mobile Security

I started working at Zimperium late January this year in the marketing communications department, and well…I’m busy.   Every day is something new. Monday – OS problem. Tuesday – “Joker” malware downloaded. Wednesday – Phones could be hacked with a single text message. Thursday – Phishing scams on the rise. Friday […]

Read more

The Other Half of the Equation: Why UEMs Need MTD

According to Gartner’s 2019 Hype Cycle for Endpoint Security, “Enterprises with average security requirements that do not provide much more than email to their mobile users, address mobile security today by establishing a security baseline and enforcing it via unified endpoint management (UEM).”  UEM is a class of software tools […]

Read more

When to Use In-App Protection

There are more than 5 million apps in the app stores. Most of these apps fit into the gaming, business, education, lifestyle, entertainment, and utility app categories. Some of these apps have access to and contain highly sensitive data and require in-app protection and security to defend against real-time cyberattacks. […]

Read more

The Other Half of the Equation: How MTD Completes EPP/EDR

According to Gartner’s 2019 Hype Cycle for Endpoint Security, “As traditional endpoint security remodernizes and mobile security innovation slows down, the two areas have reached similar levels of maturity. The convergence between mobile and more-traditional endpoints will increasingly allow security leaders to define common endpoint security strategies for all endpoint […]

Read more

Get started with Zimperium today