Check Point Blog

SideStepper: Bypassing the iOS Gatekeeper to Attack iPhone and iPad Devices

Check Point disclosed details about SideStepper, a vulnerability that can be used to install malicious enterprise apps on iPhone and iPad devices enrolled with a mobile device management (MDM) solution. The Check Point mobile research team presented details about this vulnerability at Black Hat Asia 2016 in Singapore on April 1, 2016. Click here to download the report.…

Read More
Threat Research March 31, 2016

Over the Garden Wall: Enterprise Apps Are An Unguarded Path Into iOS

iOS is supposed to be a secure environment where only certified code can run. That’s why Apple uses its app review to scrutinize each and every app before it makes it onto the App Store. However, there are other paths to distribute apps to iOS devices without going through Apple’s review. The first is using…

Read More
Uncategorized March 29, 2016

Unsecure Routers Pose a Serious Risk to Small Businesses

Today, business cannot operate without an internet connection. Business leaders are more empowered than ever with the resources attainable with the internet, and by keeping security in mind, businesses can make the most of the internet while knowing their data is secure. For many small businesses their survival is dependent on the internet, making it…

Read More
Security Insights

Check Point Threat Alert: SamSam and Maktub Ransomware Evolution

Executive Summary New and evolving ransomware campaigns, dubbed ‘SamSam’ and ‘Maktub’, use techniques not commonly observed in previously known ransomware. SamSam spreads by targeting and infecting servers that contain unpatched vulnerabilities. Maktub and Samsam do not communicate with a C&C server to encrypt files on an infected computer. SamSam’s primary target is the healthcare industry.…

Read More
Threat Research March 28, 2016

Security Management Innovation in Financial Services

The financial industry is one of the leaders in adopting new technology to service and protect its customers, and recent developments in technology have given the industry countless opportunities to do so even more. Digital systems are now the beating heart of many areas of the financial services business, opening up new communication links across…

Read More
Security Insights

In The Wild: Mobile Security Observations from the Check Point Research Team

Special thanks to malware analysts Nikita Kazymirsky and Hod Gavriel who contributed to this blog post. Mobile malware learns fast. Many times, these malwares imitate behaviors and trends first seen in the PC world. However, mobile users are much less aware of mobile malware than PC malware. This allows mobile malware to gain momentum and…

Read More
Security Insights March 25, 2016

New TeslaCrypt Ransomware Spikes on Leap Day, Attempting to Catch Users Off-Guard

In reviewing recent anomalies in our threat traffic, Omri Givoni, who heads up our Threat Prevention Cloud Group, noticed a spike of more than 100,000 events in our detections on leap day, February 29th, 2016. Zeroing in on the event, we isolated one SHA1 7429b5b4c239cb5380b6d7e4ffa070c4f92f3c79, which strangely did not show any incidents either before or…

Read More
Threat Research March 23, 2016

Over the Garden Wall: Jailbreaking Is A Threat to Consumers and Enterprises

With good reason, Apple is sensitive about the integrity and security of iOS which is purpose-built as a closed and protected environment. This design gives iOS strict control of any code executed on an iPhone or iPad. There are, however, several ways used to bypass Apple’s security by design. One of these methods is jailbreaking.…

Read More
Security Insights March 22, 2016

Lessons learned from the uKnowKids breach

Nothing is as important as our children. We will do anything we possibly can to protect them. Some parents even use apps to make sure their kids are safe, but this can turn out to be a double-edged sword. Recently, the database of the uKnowKids app was breached, and sensitive user information was leaked. But…

Read More
Security Insights March 21, 2016

Optimizing Security Management with Unified Policy

Today, cyber security is becoming more complicated as organizations’ networks are increasingly dynamic and often extend beyond the perimeter. In addition, a company’s security profile has transformed to encompass all aspects of the work environment – applications, documents, electronic data, public and private clouds, virtualized environments, users, and endpoints and mobile devices. All business units…

Read More
Security Insights