- Apr 4, 2014
See hidden discussions | Win great prizes | Get free support
Who uses MMS only criminals?
Hardly anybody but this "The worst attacks require no user interaction. This means that an Android phone can be attacked by only knowing a user’s number, using remotely-executable code via a specially crafted media file delivered via MMS." is still a problem.
Hmm, I'm always suspicious when security companies identify threats and offer a solution at the same time.Zimperium’s advanced Enterprise Mobile Threat Protection solution, zIPS, protects its enterprise customers from Stagefright vulnerability.