October 15, 2013 Viewpoints on Launching Lacoon Michael Shaulov, CEO, Lacoon Mobile Security As a founder, I view the launch by first ...
August 28, 2013 Why the Feds are Getting the Mobile Threat Wrong Yesterday, Public Intelligence – mainly, a public repository of government documents – released a joint ...
August 12, 2013 Security flaw in LG devices allows malware to root a device A new vulnerability exploiting LG Android devices was published just yesterday at the XDA conference ...
July 31, 2013 A Practical Attack Against MDM Solutions We’re looking forward to presenting today at BlackHat USA 2013. It’s going to be our ...
January 30, 2013 Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible ...
January 2, 2013 Malware Evolution: PC-based vs. Mobile 2012 signified the year where people started seriously thinking about mobile security and asking: how ...
December 17, 2012 Samsung gets Pwned again – ExynosAbuse Exploit Review A new vulnerability exploiting Android devices was published just yesterday. The vulnerability- aka ExynosAbuse – ...
November 21, 2012 Spyphones as a Political Espionage Tool Just recently high-ranking Georgian officials were accused of hacking into their political opponents’ computers and ...
November 20, 2012 Pwned: How can I prevent my iPhone from being hacked? Following our last blog entry, we were inundated by personal requests asking us: How do ...
November 15, 2012 MythBusters – is iOS Hack-Proof? At Lacoon Security we sleep, breathe and live mobile security. But one question we keep ...