Check Point Blog

Threat Research April 11, 2014

Weekly Mobile Security News Roundup

This week’s roundup is dominated by Heartbleed – a significant SSL encryption vulnerability. Heartbleed has been taking the Internet by storm and affects both PC and mobile users. The problem exacerbates as even when fixes are available for mobile users, the patching process is long and not under the control of admins or end-users.

Read More
Threat Research April 10, 2014

Social Engineering – Why mobile users are their own worst enemy

In this post, we survey the most common and in some ways, the most dangerous method, of social engineering in the mobile security domain – Malicious Advertising, or “Malvertising”.

Read More
Threat Research April 9, 2014

Microsoft Ends Support of Windows XP, Internet Explorer 8 and Office 2003

10 April 2014   The Issue:   Starting April 8, 2014, Microsoft will no longer provide security updates or technical support for Windows XP, Office 2003 and Internet Explorer 8. Without additional security updates, organizations…

Read More
Threat Research

It’s Alive: The Resurgence of ZeroAccess Botnet

Check Point Malware Research Group, 04/02/2014 Summary Through leveraging Check Point’s ThreatCloud security intelligence, in recent weeks, our vulnerability research team has detected a spike in ZeroAccess botnet activity. This is surprising given that this…

Read More
Threat Research April 8, 2014

Threat Emulation Identifies Spear Phishing Attack Using Near-Zero-Day Malware

Summary On October 22, 2013, Check Point’s ThreatCloud Threat Emulation service analyzed suspicious documents sent by email to end users at a media company. Analysis of the malware, which was intercepted through a Message Transport…

Read More
Threat Research April 4, 2014

Weekly Mobile Security News Roundup

This week’s summary is a mix of both positive and negative signs surround the mobile security world. On one hand, we’re finally witnessing both relevant punishments for security lapses as well as service providers trying to take responsibility for their users’ security. On the other hand, major players that are widely presumed to be safest mobile options, are still letting users down.

Read More
Threat Research April 2, 2014

Sounds like a Vulnerability, eh Mate? The new HTC One M8 Vulnerability

Last week, the first exploit for the HTC One M7 and the brand new HTC One M8 - two of the most popular available smartphones today - was published. The significance? The vulnerability behind this exploit means that any app, regardless of its permission set, can run the exploitable code in order to gain root access (i.e. remove all of Android’s built-in security mechanisms).

Read More
Threat Research March 28, 2014

Weekly Mobile Security News Roundup

This week’s summary highlights just how varied and dynamic mobile security is becoming. New motives for using malware in are appearing and demand attention. Additionally, it’s becoming apparent that the borders between private and work-related use of a mobile device are disappearing.

Read More
Threat Research March 21, 2014

Weekly Mobile Security News Roundup

This week’s summary touches on several major security headlines that broke this week. We continue to witness security lapses both by major app developers and by the architects of the operating systems themselves – Google, Apple and now Microsoft.

Read More