Check Point Blog
Threat Research October 25, 2013

LinkedIn Intro – A FAQ

There’s a lot of buzz regarding LinkedIn’s new iOS app – Intro. Some are hailing it, others hate it. To clarify what’s going on, we’ve put together this FAQ.

Read More
Threat Research October 15, 2013

Viewpoints on Launching Lacoon

Michael Shaulov, CEO, Lacoon Mobile Security As a founder, I view the launch by first looking back at all that we’ve accomplished in the past two years. The first four months that Ohad and I…

Read More
Threat Research August 28, 2013

Why the Feds are Getting the Mobile Threat Wrong

Yesterday, Public Intelligence – mainly, a public repository of government documents – released a joint DHS-FBI report “Threats to Mobile Devices Using the Android Operating System” (find it here). Granted, the report hasn’t been validated…

Read More
Threat Research August 12, 2013

Security flaw in LG devices allows malware to root a device

A new vulnerability exploiting LG Android devices was published just yesterday at the XDA conference in Florida, Miami.  The vulnerability exists on various LG devices, including the flagship LG Optimus G, on a number of Android…

Read More
Threat Research July 31, 2013

A Practical Attack Against MDM Solutions

We’re looking forward to presenting today at BlackHat USA 2013. It’s going to be our first time taking the stage at BlackHat Las Vegas – and we’re excited! As our title says – this is…

Read More
Threat Research January 30, 2013

Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation

Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible to existing antivirus defenses. These techniques, known as “crypting,” enable malware writers to create unknown variants of proven, highly effective…

Read More
Threat Research January 2, 2013

Malware Evolution: PC-based vs. Mobile

2012 signified the year where people started seriously thinking about mobile security and asking: how do we handle this new threat? The question was not merely one asked by uber-defense agencies (think back to Obama’s…

Read More
Threat Research December 17, 2012

Samsung gets Pwned again – ExynosAbuse Exploit Review

A new vulnerability exploiting Android devices was published just yesterday. The vulnerability- aka ExynosAbuse – exists on various Samsung devices on a number of Android versions, including 2.x, 4.0, and 4.1. The flaw is a…

Read More
Threat Research November 21, 2012

Spyphones as a Political Espionage Tool

Just recently high-ranking Georgian officials were accused of hacking into their political opponents’ computers and phone call tapping – recordings that were later uploaded to YouTube. With the prevalence of mobile phones, phone call tapping…

Read More
Threat Research November 20, 2012

Pwned: How can I prevent my iPhone from being hacked?

Following our last blog entry, we were inundated by personal requests asking us: How do iOS devices (iPhone, iPod) become infected with spyphone malware? And more pressing, how to prevent a spyphone installation? How are…

Read More