Check Point Blog

Weekly Mobile Security News Roundup

This week’s summary is a mix of articles that magnify the fact that boundaries between legitimate apps and malware, as well as the gaps between nation states and private hackers – are fading.

Read More
Threat Research February 21, 2014

The Spy in Your Pocket, Part 3: Cyber Risks to Android-based Devices

In this third and last entry in our short series overviewing mRATs, we’ll delve into the risks facing Android-based devices.

Read More
Threat Research February 19, 2014

The Spy in Your Pocket, Part 2: Cyber Threats to iOS

In this second entry in our short series overviewing mRATs, we’ll delve into the threats facing iOS.

Read More
Threat Research February 17, 2014

Weekly Mobile Security News Roundup

What’s new on the mobile security front? From an uncovered APT campaign that had been running since 2007, to new Android research unveiled platform issues affecting the permissions, and Snapchat hacks. If you weren’t able to keep up with the news – we did it for you.

Read More
Threat Research February 14, 2014

AVPasser: When Widespread Malware Adopts Targeted Attack Capabilities

We’d like to draw your attention to another new Chinese malware for Android, named AVPasser. AVPasser looks like an advanced mRAT (Mobile Remote Access Trojan) and was first discovered by Chinese researchers. Our own follow-up research revealed a very interesting capability – self uninstall.

Read More
Threat Research February 12, 2014

The Spy in Your Pocket, Part 1: An Overview of Mobile Remote Access Trojans (mRATs)

We’re excited to present at the upcoming RSA 2014 at the end of the month. Our talk “Practical Attacks against MDM Solutions (and What You Can Do About It)” is going to focus on various threats to mobile devices and how mobile Remote Access Trojans (mRATs) are able to bypass current detection solutions. Leading up to the conference, we’d like to provide you with this short series overviewing mRATs.

Read More
Threat Research February 10, 2014

WEEKLY MOBILE SECURITY NEWS ROUNDUP

Read More
Threat Research February 7, 2014

Protecting the Attorney-Client Privilege: Security in a Mobile-driven Legal World

When people talk about security in terms of industries, verticals such as finance, retail and healthcare tend to pop up a lot. Surprisingly, legal is placed lower on the security-focus rung.

Read More
Threat Research February 3, 2014