Zimperium
Follow
1943 Followers
Follow Zimperium on their other social channels!
About Us
Founded:
2010
Company Size:
51-200 employees
Company Type:
Private
Location:
San Francisco, CA
Website:
Zimperium, the industry leader in Mobile Threat Defense, offers real-time, on-device protection against both known and previously unknown threats, enabling detection and remediation of attacks on all three mobile threat vectors - Device, Network and Applications. Zimperium’s patented z9™ detecti ...
Read more
Promoted Content
451 SWOT Analysis, Zimperium Aims to Plug Mobile Security Leaks
Follow
36
Clicking Bot Applications
Cyber crime, like any crime, has its motives; each malware has its own malicious profit. Spyware spies on you. Ransomware demands a ransom to decrypt your private digital data. Phishing Malware phishes for your username, password or account numbers. Installation-fraud achieves fake software installations. Ad fraud fraudulently represents online advertisement impressions, clicks, conversion or data events in order to generate financial gain for the developer. And finally, there is Click fraud. Cl ...
Follow
26
Detecting DoubleLocker Ransomware
What is DoubleLocker? Security researchers at ESET discovered a new ransomware infecting Android phones called DoubleLocker. DoubleLocker is an exploit that encrypts data on the infected device and then changes the device PIN to a random number. Victims remain locked out of their device unless they pay a ransom to the hackers. DoubleLocker spreads in the very same way as its banking parent does. It is distributed mostly as a fake Adobe Flash Player through compromised website ...
Follow
43
Detecting KRACK Man in the Middle Attacks
What is KRACK? KRACK (Key Reinstallation attaCKs, KRACKs) is a serious weakness in the WPA2 protocol. WPA2 secures all modern protected Wi-Fi networks including those used by smartphones. Attackers within physical range of a Wi-Fi network can exploit protocol weaknesses by using key reinstallation attacks. The attack works against all modern protected Wi-Fi networks and can be used to steal sensitive information such as usernames, passwords, messages, emails, photos, calendaring and contacts inf ...
Follow
27
Validating Machine Learning Detection of Mobile Malware
Zimperium’s core machine learning engine, z9, has a proven track record of detecting zero-day exploits. We recently announced an extension of the framework that detects previously unknown mobile malware. This extension is known as “z9 for Mobile Malware”, and was officially announced in September 2017. Internally, the code name has been “Cogito”, so this research blog will use that name throughout. On a pool of approximately 1800 samples collected from the Play Stor ...
Follow
29
Zimperium Named a Leader in the IDC MarketScape for Mobile Threat Management
Zimperium has been positioned as a leader in the IDC MarketScape* on worldwide Mobile Threat Management Security Software. The IDC MarketScape provides a clear framework in which the product and service offerings, capabilities and strategies, and current and future market success factors of IT and telecommunications vendors can be meaningfully compared. Mike Jennett, research vice president, Enterprise Mobility Strategies, at IDC, says, “Mobile threat management is emerging as a must-have ...
Follow
40
MobileIron and Zimperium Create First Real Time Detection and Remediation for Mobile Threats
Zimperium and MobileIron are coming together and simplifying mobile threat defense. MobileIron will integrate with Zimperium’s machine learning based threat detection and provide a comprehensive security solution for enterprise customers. The integration of our machine-learning driven threat detection with MobileIron’s security and compliance engine provides enterprises with speed and scalability as they automate the process of detecting and responding to mobile threats. MobileIron e ...
Follow
48
Zimperium Mobile Threat Detection Available in Oracle Cloud
In recent weeks we have been discussing some of the ways Zimperium delivers mobile threat defense (MTD) at scale. As the only true enterprise-class MTD solution available, we take that role seriously. So we are pleased to deliver another option for enterprises to implement mobile threat defense and take advantage of available infrastructure and resources. You can now host the Zimperium MTD platform on Oracle Cloud Infrastructure. Bringing the Zimperium platform to multiple clouds was inevitable. ...
Follow
62
Mobile Threat Data Q2 2017
Zimperium is releasing its most recent summarized mobile threat data detected via our global enterprise customers. The data provides insight into what type of threats our customers are detecting by having the zIPS mobile threat defense app on corporate and BYO devices. zIPS enables companies to detect threats to mobile devices in real-time, so attacks via mobile vectors stop at the device level and don’t advance beyond the targeted device. Our customers detected hundreds of thousands ...
Follow
57
Your Guide to Mobile Threat Defense
“The signs are clear that mobile threats can no longer be ignored. Security and risk management leaders must familiarize themselves with mobile threat defense solutions and plan to gradually integrate them to mitigate mobile risks.”* *Gartner Market Guide for Mobile Threat Defense Solutions, Dionisio Zumerle, John Girard, 22 August 2017 Gartner recently released its second Market Guide for Mobile Threat Defense (MTD) Solutions. In the document, Gartner provides an overview of mobile ...
Follow
89
ziVA: Zimperium’s iOS Video Audio Kernel Exploit
Follow @doadam Following my previous post, I’m releasing ziVA: a fully chained iOS kernel exploit that (should) work on all the iOS devices running iOS 10.3.1 or earlier. The exploit itself consists of multiple vulnerabilities that were discovered all in the same module: AppleAVEDriver. The exploit will be covered in depth in my HITBGSEC talk held on August 25th. For those of you who are not interested in iOS research and would like to protect themselves against these vulnerabilities, we u ...
Follow
Reversing Android Applications 101 - Zimperium researcher @evilsocket provides a (relatively) easy and fun way to teach you how to reverse engineer Android applications. Check out his  “tricks” to reverse faster and more effectively. https://www.evilsocket.net/2017/04/27/Android-Applications-Reversing-101/

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel