Video: Zimperium takes over Nexus 6 using Stagefright

Just how safe is your phone from hackers? Our own zLabs VP of Research Joshua Drake and founder and chairman Zuk Avraham sat down with Crime Watch Daily’s Ana Garcia to show viewers just how dangerous hackers abusing the Stagefright vulnerabilities can be. One of the most common ways for hackers to take over a person’s … Read More

Zimperium’s z9 Engine Detected the Recent Adware with Rooting Capabilities without an Update

Last week, a new strain of trojan adware was discovered, bearing automatic device-rooting capabilities that make it  almost impossible to remove from affected Android devices. This malware, dubbed Shuanet is another example of increasing sophistication in mobile threats. Shuanet is the third family in a trilogy of recently discovered malicious adware that disguises itself as … Read More

Enhancing Mobility Management with Cyber Security

        Mobile devices and ubiquitous wireless connectivity have triggered a new lifestyle. We now access information anywhere, anytime as do our adversaries. You should proceed with caution! The power enabling us to do more, also makes us vulnerable to cyberattacks. We at Zimperium are playing our part in mobile safety and would … Read More

Zimperium Wins Telecom Council’s ‘Most Disruptive Technology’ Award

We’re thrilled to announce that Zimperium’s Mobile Threat Protection solution won the San Andreas Award for Most Disruptive Technology at the 8th annual TC3 Summit. The Service Provider Innovation Forum (SPIF) of the Telecom Council of Silicon Valley recognized Zimperium for our innovation, execution, management and technology at the Council’s SPIFFY awards ceremony in Mountain … Read More

zYiRemoval – Free tool to remove YiSpecter

By: Nikias BassenFollow Nikias Bassen (@pimskeks) An enterprise security vendor, Palo Alto Networks,  followed up on a threat discovered by Cheetah Mobile and Qihoo360, and identified a malware spreading through social media and other channels. This malware, named YiSpecter, is abusing enterprise code signing to trick the user into installing a malicious app. Following Zimperium’s … Read More