Check Point Blog
Threat Research January 2, 2013

Malware Evolution: PC-based vs. Mobile

2012 signified the year where people started seriously thinking about mobile security and asking: how do we handle this new threat? The question was not merely one asked by uber-defense agencies (think back to Obama’s…

Read More
Threat Research December 17, 2012

Samsung gets Pwned again – ExynosAbuse Exploit Review

A new vulnerability exploiting Android devices was published just yesterday. The vulnerability- aka ExynosAbuse – exists on various Samsung devices on a number of Android versions, including 2.x, 4.0, and 4.1. The flaw is a…

Read More
Threat Research November 21, 2012

Spyphones as a Political Espionage Tool

Just recently high-ranking Georgian officials were accused of hacking into their political opponents’ computers and phone call tapping – recordings that were later uploaded to YouTube. With the prevalence of mobile phones, phone call tapping…

Read More
Threat Research November 20, 2012

Pwned: How can I prevent my iPhone from being hacked?

Following our last blog entry, we were inundated by personal requests asking us: How do iOS devices (iPhone, iPod) become infected with spyphone malware? And more pressing, how to prevent a spyphone installation? How are…

Read More
Threat Research November 15, 2012

MythBusters – is iOS Hack-Proof?

At Lacoon Security we sleep, breathe and live mobile security. But one question we keep receiving is whether iPhones are in fact hack-proof. After all, when you hear about malicious apps – such as those…

Read More