Check Point Blog

Weekly Mobile Security News Roundup

This week’s summary highlights just how varied and dynamic mobile security is becoming. New motives for using malware in are appearing and demand attention. Additionally, it’s becoming apparent that the borders between private and work-related use of a mobile device are disappearing.

Read More
Threat Research March 28, 2014

Weekly Mobile Security News Roundup

This week’s summary touches on several major security headlines that broke this week. We continue to witness security lapses both by major app developers and by the architects of the operating systems themselves – Google, Apple and now Microsoft.

Read More
Threat Research March 21, 2014

Weekly Mobile Security News Roundup

The release of iOS 7.1 can serve as a metaphor for this week’s summary. Perhaps the most substantial part of Apple’s update was a major security patch that dealt with more than 40 issues. The patch addresses a vast range of different security flaws, signifying how diverse the world of malware is. It also says a lot about the security of iOS (presumed to be the more secure of the two main OSs) as well as about the robustness of the major players in the mobile world. Even (or maybe, especially) Apple and Google aren’t invulnerable to malware, let alone the smaller developers.

Read More
Threat Research March 15, 2014

Weekly Mobile Security News Roundup

This week’s summary sheds light on several emerging trends in the mobile malware world. As it grows and develops, malware is becoming the means to a new end (Crypto-Currency Mining for instance). The second major point focuses on the growing and evolving business of mobile malware – reputation, reliability and innovation are expected and required from malware creators and distributors.

Read More
Threat Research March 7, 2014

Weekly Mobile Security News Roundup

In some ways, this week’s summary somewhat highlights the polarity of the mobile security world. With the year’s biggest security conference in the form of RSA finishing today, we can see that while awareness to the severity and size of the issue of mobile security is growing and evolving, so are the threats.

Read More
Threat Research March 3, 2014