written and researched by Nicolás Chiaraviglio and Santiago A. Rodriguez As mentioned in our blogpost on mobile phishing, there are different types of phishing attacks. Here, we’ll dig deeper into the different types that exist. Moreover, we’ll take a look at phishing kits, a tool that allows non-technical scammers to execute successful attacks. All phishing … Read More
As the coronavirus continues to impact the world and we learn more about the scale and scope, one result is the surge in remote workers. Multiple news sites are reporting that throughout Europe including Germany, China, Italy, Japan, and South Korea, workers have been on lockdown, and are now working from home. Last week, the … Read More
The post Employees Working Remotely Need Secure Mobile Endpoint Devices appeared first on Zimperium Mobile Security Blog.
It is no longer a matter of if or when an enterprise’s mobile endpoints are at risk of being attacked – – they already are; that according to findings in our “State of Enterprise Mobile Security” Report for 2019. Our research shows 100% of organizations protecting their mobile endpoints with Zimperium have detected and prevented … Read More
The post Zimperium’s “State of Enterprise Mobile Security” Report for 2019 appeared first on Zimperium Mobile Security Blog.