Check Point Blog

Threat Research May 17, 2014

Mobile Security Weekly – Malware hits 2 million milestone

This week’s summary is dominated by an aggressive new Android worm attacking Israeli Android devices. The rest of the roundup comprises of quite a diverse mix of issues. We’ve got newly discovered problems with Android OS, app developers failing their users as well the news that mobile malware has reached a new milestone - 2 million different instances. This wide range just goes to show how many different ways mobile malware is evolving.

Read More
Threat Research May 13, 2014

Mobile Phishing – Why are users still getting hooked? (Social Engineering Ep. 5)

Mobile phishing attacks are one of the best examples of the ongoing migration of attackers and cyber-criminals from the PC to the mobile world. Phishing attacks have been around for years and include several of…

Read More
Threat Research May 10, 2014

Mobile Security Weekly – Mobile Malware goes Global

This week’s summary highlights two main points: The global reach of malware – and their targets. Users and enterprises in the biggest European and American markets are due to become the most targeted. Mobile malware…

Read More
Threat Research May 6, 2014

Rogue WiFi Hotspots – Why getting coffee is putting your enterprise at risk (Social Engineering Ep. 4)

Most people don’t think twice before connecting to a free public Wi-Fi hotspot at a coffee shop, airport, or hotel. If someone is providing free WiFi, users will usually connect first and think later. With rogue Wi-Fi hotspots growing in numbers, it’s becoming much more critical to monitor connectivity.

Read More
Threat Research May 2, 2014

Mobile Security Weekly – Mobile Malware finds new ways to steal from victims

This week’s summary serves as a reminder that mobile malware is developing and advancing on several different fronts. On one front, attacker are finding new ways to target and exploit victims as well as to bypass security measures. In another front, attackers are continuing to find ways to attack the biggest and most established apps on the market.

Read More
Threat Research April 29, 2014

Mobile Scareware – Bringing Scary Back (Social Engineering Ep. 3)

With this entry, we continue our series on common methods of social engineering that target mobile devices. This time around, we discuss "Scareware”.

Read More
Threat Research April 28, 2014

Bleeding-in-the-Browser – Why Downplaying of Reverse Heartbleed Risk for Mobile is Dangerous to the Enterprise

For the past few weeks, we’ve been researching methods to protect our customers from Heartbleed. Some researchers downplay client-side Heartbleed attacks and believe them to be improbable due to the required scenarios for an attack and…

Read More
Threat Research April 26, 2014

Weekly Mobile Security News Roundup – Are your Mobile Apps Exposing Sensitive Data?

For the first time in several weeks, this week’s summary isn’t dominated by the OpenSSL vulnerability - Heartbleed. While Heartbleed may not breaking news anymore - we still recommend making it a priority to ensure your enterprise is protected from it. This week’s items serve as another reminder of the different ways an app or a device can expose sensitive data.

Read More
Threat Research April 22, 2014

Fake Applications: Why mobile users can’t judge a book by its cover. (Social Engineering Ep. 2)

The second post from our series on the different mobile security aspects of social engineering covers another major threat, Fake Applications. Fake apps owes much of its success to users’ susceptibility to pressure, repetition and…

Read More
Threat Research April 18, 2014

Weekly Mobile Security News Roundup – Heartbleed Leaves Mobile Users Vulnerable to Attacks

Another week of mobile security news has been mostly dominated by the after effects of the discovery of Heartbleed. It’s becoming apparent that fears regarding the magnitude of the event weren't exaggerated. With Heartbleed based PC attacks already being reported, this issue is still evolving.

Read More