Yesterday, WikiLeaks published documents suggesting the CIA had access to, and developed, tools that can be used to hack smartphones and other Internet connected devices. This is not a surprise to anyone who is even remotely associated to the security industry. These kinds of tools have been in the wild for several years now, and … Read More
Zimperium added a couple of new features and screens to zIPS today based on customer demand. Our users understand the threat that mobile devices introduce into enterprises and have used zIPS to monitor for threats on Wi-Fi, apps and OS exploits, but some asked to peek under the screens a little more to understand how zIPS … Read More
Whether deployed to steal ammo for political scandals or classified documents for military sabotage, a cyberattack on a mobile device with access to sensitive information is a matter of national security. And yet, mobile devices are often left out of the national security conversation. Obama’s recently implemented Cybersecurity National Action Plan makes no mention of … Read More