Highlights: Check Point Research (CPR) examines a long running mobile surveillance campaign, targeting the largest minority in China- the Uyghurs. The campaign is attributed to the Scarlet Mimic hacking group, which has used more than…
Read MoreSmartphones usually come with pre-installed apps, some of which are useful and some that never get used at all. What a user does not expect, however, is for a preinstalled app to be an actual…
Read MoreMany people believe that the iOS operating system is immune to mobile threats and malware. They rely on the low volume of attacks on iOS in comparison to Android as their main piece of evidence.…
Read MoreBy Brian Gleeson, Head of Threat Prevention Product Marketing, Check Point It is no secret that mobile devices remain the weakest link in the security strategy of most businesses, despite the increasing frequency of…
Read MoreWe can count on one thing when it comes to protecting businesses from cyberattacks. Threat actors will always exploit the softest part of their targets. Today, in the fifth generation of cyberattacks, this fact rings…
Read MoreGoogle recently published its 2017 security report for the Android ecosystem, a comprehensive overview of the constantly evolving mobile threat landscape, which indicates that Trojans, spyware, and hostile downloaders account for a large portion of mobile threats…
Read MoreMobile devices are critical to every organization’s digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. In fact, 20% of…
Read MoreIn the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children. Check Point Researchers have revealed a new and nasty malicious…
Read MoreCheck Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts overrides the user’s decision to disable ads showing outside of a legitimate context,…
Read MoreEvery business has experienced at least one mobile cyberattack in the past year, according to a new study published today by Check Point mobile threat researchers. The report, entitled Mobile Cyberattacks Impact Every Business, is…
Read More