Sharing a Heritage of Innovation and “The Right Stuff”

 
Last month, we introduced Capsule, a new way of securing your mobile environment and your critical documents. Today, we commend the United States and another capsule of innovation, the Orion. For those who missed the launch and landing, it brought to me the same thrill I felt as a kid, when I witnessed the Apollo program. Though some may think Orion is a rehash of a 40 year-old design, the only commonality with Apollo is the shape—just as a Boeing 787 shares the same shape as a 707, and flies in the air, the reality is that it’s  a completely different machine under the form. Similarly, when it comes to secure mobility products on the market, we see a lot of the same terminology ...

Mobile Security Weekly: Uber’s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again

 
Ohad Bobrov is co-founder and CTO at Lacoon Mobile Security. This week’s issue highlights just how careful users need to be, even when using popular and well-known apps. Uber and WhatsApp are installed on huge numbers of devices, yet they both have severe security issues. And the newest version of iOS has already been jailbroken - which is always bad new for the enterprise. Uber for Android Exhibits Malware-like Behavior The hugely popular ride-sharing service Uber has been hit by various controversies lately, but things are seemingly moving from bad to worse, with some researchers describing the app as ‘literally malware." ...

Let’s Be Fair and Test Technology the Same Way We Use It.

 
More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once an email hits their inbox, it has been scanned and is safe to open. But is it? We created the Zero Second test to find out. The best way to evaluate the effectiveness of multiple technology vendors is to run them through a typical situation and see how they perform. For the Zero Second test, we decided that scanning email attachments is as basic of a work situation as it gets. We created a scenario where an “excellent candidate” sends a resume along with ...

Man in the Binder: He Who Controls the IPC Controls the Droid

 
At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the IPC, Controls the Droid.” Nitay and Idan’s research of Android’s unique operating system (OS) architecture showed the potential capture of data and information being stored and communicated on Android devices through the Binder, the message passing mechanism in Inter-process Communication (IPC). The research uncovered that as the single point of communication, the Binder is a natural target for Android malware. In a typical OS, a process will hold dozens of handles for the ...