Talk:Zimperium

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Milestones and awards[edit]

  • October 2010: ZIMPERIUM founded, originally as a consulting company specializing in smart device security.
  • July 2011: ANTI (Android Network Toolkit), later renamed ZANTI, Android-based penetration testing framework launched at Blackhat/Defcon, Las Vegas, NV.[1]
  • April 2012: Alpha of zDefender (later renamed to ZIPS), launched at Demo Spring, Santa Clara, CA.
  • July 2012: Kevin Mitnick joins the company as an active advisory board member[2]
  • September 2012: ZANTI receives PCMagazine’s Editor’s Choice award[3]
  • February 2013: ZIMPERIUM reveals the world's first Mobile IPS (Mobile Intrusion Prevention System) at Mobile World Congress 2013, Barcelona, Spain[4]
  • January 2014: ZIMPERIUM Mobile IPS (zIPS) is available as general availability for businesses. According to MIT Technology Review, zIPS use Machine Learning to learn and detect attacks completely in user-mode.[5]
  • October 23, 2014: Zimperium Appoints Shridhar Mittal as CEO.[6]
  • April, May 2015: ZIMPERIUM VP of Platform Research and Exploitation, Joshua Drake, reports set of critical vulnerabilities in libstagefright, collectively known as Stagefright (bug) to Google.[7]
  • August 2015: full disclosure of the Stagefright bug, presented by Drake, took place on August 5, 2015 at the Black Hat USA[8] computer security conference, and on August 7, 2015 at the DEF CON 23[9][10]
  • October 2015: Zimperium released details of further vulnerabilities, also known as Stagefright 2.0.[11]
  • August 2016: Frost & Sullivan recognizes Zimperium with the 2016 North America Award for Technology Innovation for its unique ability to integrate a best-in-class behavioral analytics engine with a mobile threat detection management solution.[12]

References

  1. ^ "Android App Turns Smartphones Into Mobile Hacking Machines". Forbes. 2011-05-08. Retrieved 2015-08-13.
  2. ^ Mohit Kumar (2012-07-19). "Kevin Mitnick joins the Zimperium team". Thehackernews.com. Retrieved 2015-08-13.
  3. ^ Lynn, Samara. "Anti-Android Network Toolkit Review & Rating". PCMag.com. Retrieved 2015-08-13.
  4. ^ Storm, Darlene (2013-02-26). "World's first on-device mobile intrusion prevention system | Computerworld". Blogs.computerworld.com. Retrieved 2015-08-13.
  5. ^ Metz, Rachel (2014-01-23). "App Pays Attention to Phone's Behavior to Spot New Malware | MIT Technology Review". Technologyreview.com. Retrieved 2015-08-13.
  6. ^ "Press Release - Zimperium Appoints Shridhar Mittal As New CEO And Zuk Avraham As Chairman". www.zimperium.com. Retrieved 2016-11-03.
  7. ^ Joshua J. Drake (May 5, 2015). "Change Ie93b3038: Prevent reading past the end of the buffer in 3GPP". android-review.googlesource.com. Retrieved August 25, 2015.
  8. ^ "Stagefright: Scary Code in the Heart of Android". blackhat.com. August 21, 2015. Retrieved August 25, 2015.
  9. ^ "Stagefright: Scary Code in the Heart of Android". defcon.org. August 7, 2015. Retrieved August 25, 2015.
  10. ^ Thomas Fox-Brewster (July 27, 2015). "Stagefright: It Only Takes One Text To Hack 950 Million Android Phones". Forbes. Retrieved July 28, 2015. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  11. ^ "Stagefright 2.0 Vulnerabilities Affect 1 Billion Android Devices". www.threatpost.com. October 1, 2015. Retrieved October 1, 2015.
  12. ^ "Frost & Sullivan Applauds Zimperium's Mobile-Specific Threat Detection Technology, the z9 Engine". Frost & Sullivan. 2016-08-30.

Moving here for storage as not suitable for the main page in current form. K.e.coffman (talk) 04:49, 19 November 2016 (UTC)[reply]