Mobile Security Is National Security

Whether deployed to steal ammo for political scandals or classified documents for military sabotage, a cyberattack on a mobile device with access to sensitive information is a matter of national security. And yet, mobile devices are often left out of the national security conversation. Obama’s recently implemented Cybersecurity National Action Plan makes no mention of … Read More

187 shares

CVE-2015-3864 Metasploit module now available for testing

By: Zuk Avraham Follow Zuk Avraham (@ihackbanme) Joshua DrakeFollow Joshua Drake (@jduck) Last year, we disclosed a series of critical vulnerabilities within Android’s multimedia processing code — libstagefright. We promised to release the exploit for testing purposes and quickly published our exploit for CVE-2015-1538 targeting the Galaxy Nexus running Android 4.0.4. We delivered this exploit … Read More

187 shares

Zimperium Partners with BlackBerry to Provide Mobile Threat Detection

I am very excited our strategic partnership with BlackBerry is gaining momentum. zIPS and BlackBerry’s Good Dynamics Secure Mobility Platform and BES12 are integrated to deliver enterprise and government customers with comprehensive mobile threat detection, risk analysis and prevention for both iOS and Android devices.  “Good Dynamics and BES12 integrated with Zimperium zIPS offers comprehensive threat detection, … Read More

187 shares

Understanding – “Pegasus” a Targeted Attack Remotely Infecting iOS Devices

Pegasus is a sophisticated trojan targeting the iOS platform. It provides an attacker abilities to remotely monitor and capture communication from a device (including calls, texts, Whatsapp, Viber, etc). A successful attack transforms a device running iOS into a powerful surveillance tool. This is a persistent attack and enables an attacker to remotely update and … Read More

187 shares

Analysis of multiple vulnerabilities in different open source BTS products

Background By:Simone Margaritelli Follow Simone Margaritelli (@evilsocket)        Zimperium zLabs Follow Zimperium zLabs (@zLabsProeject) During the last weeks we’ve been investigating multiple aspects of GSM security such as protocol vulnerabilities as well as source auditing the world’s most common open source software products that run GSM networks. In this post we’ll share the details about multiple vulnerabilities … Read More

187 shares