Enhance App Shielding with In-App Protection

Mobile devices and the apps operating on them expose your backend systems to cyberattacks. Attackers exploit vulnerabilities in mobile operating systems and in your apps to spy on your users, grab their private data, or even steal their money. In response, many mobile app developers are using app shielding, sometimes called “app hardening,” to protect … Read More

Unified Endpoint Security with VMware & Zimperium

We have said this many times: an endpoint is an endpoint is an endpoint. Today, users perform more than 80% of their daily work on mobile devices. These devices contain or have access to the same information and applications traditional endpoints (laptop, desktop) do.  Unfortunately, they also expose organizations to new threats that must be … Read More

A Deeper Dive into Phishing Attacks

written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez As mentioned in our blog post on mobile phishing, there are different types of phishing attacks. Here, we’ll dig deeper into the different types that exist. Moreover, we’ll take a look at phishing kits, a tool that allows non-technical scammers to execute successful attacks.  All … Read More

Gone (Mobile) Phishing

written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez CISOs worldwide are scrambling to address phishing attacks. In the second quarter of 2019 alone, there were close to 130 million phishing attacks, taking place on different types of devices within an enterprise – – desktops, laptops and mobile devices. And as unfortunate as it … Read More