How To Protect Billions Against Mobile Banking Fraud: Open Your Eyes!

Webinar to discuss how banking organizations can secure their mobile banking apps while not impacting the user experience. Zimperium is providing banking organizations with the solution needed to protect mobile applications in order to give visibility into protecting billions of dollars against mobile banking fraud. Zimperium executive, JT Keating, vice president of product strategy, will … Read More

Zimperium Named to Analytics Insight Magazine’s “10 Most Innovative Companies in Machine Learning 2018”

Zimperium has been named to Analytics Insight Magazine’s “10 Most Innovative Companies in Machine Learning 2018” list and is the featured cover story of the magazine’s July issue. “We see a rapid growth in the application of machine learning to complex business problems in every industry today. Machine learning is delivering insights to organizations that would … Read More

Zimperium Webinar: State of Mobile Device Threats

Webinar displays thousands of mobile threats Zimperium detected and how mobile devices are being used for surveillance and data theft. Zimperium is providing mobile threat data for customers, media and the general public via a live webinar. Zimperium executive, JT Keating, vice president of product strategy, will lead the session and answer questions. WHO: Zimperium, … Read More

aLTEr: POC Exploit of LTE Layer Two

Long Term Evolution (LTE) is the latest mobile telephony standard designed to bring many security improvements over the predecessor standard known as the Global System for Mobile (GSM). In a new research paper, security researchers from Ruhr-Universität Bochum and New York University Abu Dhabi outline attacks that could allow sophisticated hackers to spy on users’ … Read More

RAMpage: The Latest Rowhammer-esque Android Vulnerability

On June 28th, a group of eight academics across three different universities released a research paper outlining a new Android vulnerability called “RAMpage”.  It’s a variation of previous attacks that use the Rowhammer hardware vulnerability to run malicious code by changing what’s stored in a device’s memory (RAM) and has the potential of data loss … Read More