Mobile Security Weekly: Black Friday Security Threats, On Sale Now!

 
Ohad Bobrov is co-founder and CTO at Lacoon Mobile Security. With Thanksgiving over and the holiday shopping season ahead of us, it’s no surprise that this week’s edition is closely tied to the biggest day of the year for technology shoppers. It seems that besides good deals, Black Friday and Cyber Monday are also a major threat to the security of your user data and your money. The week’s other big story is DoubleDirect - a smart, effective and efficient new form of MitM attack that is being implemented all around the world. Cheap Black Friday Android Tablets are Riddled with Security Holes With some priced as low as $39.99, it looks ...

Has Your Android Device Been Fakedebuggered?

 
Information about a new vulnerability used to gain device root access to install files on the Android device file system, an area that can be accessed only with system or root permissions, was published yesterday by Chinese antivirus company 360. The vulnerability uses two known Android 4.x Privilege Escalation (PE) exploits, FramaRoot and TowelRoot, to run code under root privileges and to install a root toolkit on the device, allowing an attacker to hide the code and avoid attempts to remove the malicious apps. This represents a serious escalation in Android malware, and is the first time we’ve seen reports of malware that uses Android 4.x PE exploit ...

Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy

 
Ohad Bobrov is co-founder and CTO at Lacoon Mobile Security. As we draw nearer to the end of 2014, the world of mobile malware is reminding us just how many steps forward it has taken over the past 11 months. This weeks edition is dominated by NotCompatible, an advanced mRAT that we haven’t heard the last of. On the other end of the spectrum, Whatsapp, one of the most popular messaging apps in the world is moving with times and addressing a major worry of many users - privacy. “NotCompatible” - The Most Advanced Android mRAT Yet? NotCompatible, a strain of Android malware, has evolved into a threat comparable to PC malware. It boasts ...

A Look Ahead: Mobile Security Predictions for 2015

 
Michael Shaulov is co-founder and CEO of Lacoon Mobile Security. With 2015 just around the corner, we took a look back at some of the biggest trends in mobile security over the past year. From Towelroot and PanGu to Chinese iOS spyware and Masque Attack, it’s no secret that organizations endured many sophisticated mobile attacks in 2014. While some were prepared, others fell short in their awareness and protection. As we look ahead to the New Year, I'd like to share with you Lacoon's Mobile Security Predictions for 2015. 1. Government Spying Nation-states or governments will increase their cyberspying efforts, and will implement new ...

New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition

 
If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the performance of five security products. They specifically focused on products claiming superior performance for Advanced Threat Detection to determine the security efficacy (catch rate) of sandboxing capabilities. Miercom wanted to see how a set of vendors would actually perform against known malware, unknown (also known as Zero Day) malware, and Advanced Persistent Threats (APTs). They were looking specifically at catch rates as well as the time each vendor took to sandbox new ...

A Billion Android Devices Exposed — Are you at risk?

 
(CVE-2014-7911) Privilege Escalation Exploit for Android Researchers on Tuesday released details of a vulnerability in Google’s Android operating system versions prior to Android 5.0 (a.k.a Lollipop). This Privilege Escalation vulnerability enables an attacker to acquire administrator level permissions and access. When exploited, it leaves Android devices exposed by failing to properly and securely serialize data, allowing an app to bypass restrictions, and an attacker to run code under system privileges. (For more technical information, visit the Android Git repositories.) Who’s at risk? Although Lollipop is immune, it’s ...

Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach?

 
Just over a week ago, we published an in-depth look at “WireLurker,” one of the most advanced attacks on Mac OS X and iOS devices. WireLurker is the first malware that affects both platforms and introduces on-the-fly repackaging of apps on iOS devices that have and, more importantly, that have not been jailbroken. Although WireLurker was a dangerous exploit, the more troublesome issue is the vulnerability WireLurker was implementing.  Called “Masque Attack,” this threat allows cybercriminals to install fake iOS apps on a victim’s iPhone or iPad by tricking them into tapping links that install malicious apps. This doesn’t bode well for users, as ...

Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up

 
This week’s issue is dominated by MasqueAttack. The vulnerability, which has caused the US government to issue a security warning for all iOS users, is undoubtedly a major threat. The fact that Apple may have known about it’s existence since July 2014 also poses quite a few pressing questions. Elsewhere, it “business as usual” with another dangerous new Android worm. In an interesting business development, Blackberry and Samsung have formed a new partnership. MasqueAttack has reached Homeland Security Levels of Danger In reaction to the headlines surrounding the mobile world’s newest major threat, the U.S. government released a statement for all iPhone ...

When it Comes to Security, What is Good Enough?

 
Ben Franklin once said that an ounce of prevention is better than a pound of cure. We couldn’t agree more when it comes to network security. From both time and financial standpoints, it is much more cost effective to prevent infections than deal with their aftermath. Infection cleanup is very costly to businesses. The latest estimates indicate that every lost identity record costs a business $188. While that doesn’t sound like a lot, multiply it by anywhere from 100,000 to several million records, which are typically what is lost in a single incident, and the costs add up quickly. In Check Point’s Zero Second Test, four vendors were evaluated to see how quickly they could respond ...

Immobilize WireLurker Before It Immobilizes You

 
A recent malware, “WireLurker”, affects Apple OS X and iOS. As highlighted in the recent announcement by Check Point on mobile security, the amount of mobile malware is on the rise. In this case, WireLurker affects both desktop and mobile platforms. The infection starts through trojanized and repackaged OS X applications. It then transfers to non-jailbroken devices once connected for synchronization. Check Point’s Threat Prevention solution protects mobile devices everywhere from WireLurker damage by identifying infected devices and stopping the attempt to connect to a command & control server through the security gateway or through Check Point’s Capsule Cloud ...