Security Limitations in Smartphones

In our previous blog post, we wrote about what’s planned for 2014. Since we’re aiming to change the world of mobile security, maybe a good place to start is to describe the security limitations on smart devices. Like a computer, right? Often, people think that mobile device security is exactly […]

Read more

LinkedIn 0day Vulnerability Puts Your Data at Risk

Today, corporate networks and websites face varying degrees of cyber-threats – ranging from widespread well-publicized threats like the recent Heartbleed bug, to those that are less well-known, but just as damaging, like “Man-in-the-Middle” (MITM) attacks. The latter cyber-threat threats are network attacks that allow hackers to intercept users’ internet communication, […]

Read more

How 2014 is going to be Z-Year

ZIMPERIUM recently announced a Series A fund-raising round of $8 Million. This will allow us to support all organizations demanding a change in current mobile security offerings; they are seeking advanced, next-generation security protection comparable to what you would expect in today’s sophisticated enterprise networks, but a solution which protects […]

Read more