Check Point Blog
Threat Research November 26, 2013

Android Rooting Tools Recently Released: “VROOT” and “Motochopper”

Two new rooting tools against a wide spectrum of Android devices, ranging from version 4.0 till 4.4, were recently found. These tools allow an adversary to bypass the Android permission model and gain full control…

Read More
Threat Research November 14, 2013

Defeating Cryptolocker with ThreatCloud and Gateway Threat Prevention

Summary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…

Read More
Threat Research November 1, 2013

Threat Emulation Exposes Widespread Malware Campaign

Summary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…

Read More
Threat Research October 25, 2013

LinkedIn Intro – A FAQ

There’s a lot of buzz regarding LinkedIn’s new iOS app – Intro. Some are hailing it, others hate it. To clarify what’s going on, we’ve put together this FAQ.

Read More
Threat Research October 15, 2013

Viewpoints on Launching Lacoon

Michael Shaulov, CEO, Lacoon Mobile Security As a founder, I view the launch by first looking back at all that we’ve accomplished in the past two years. The first four months that Ohad and I…

Read More
Threat Research August 28, 2013

Why the Feds are Getting the Mobile Threat Wrong

Yesterday, Public Intelligence – mainly, a public repository of government documents – released a joint DHS-FBI report “Threats to Mobile Devices Using the Android Operating System” (find it here). Granted, the report hasn’t been validated…

Read More
Threat Research August 12, 2013

Security flaw in LG devices allows malware to root a device

A new vulnerability exploiting LG Android devices was published just yesterday at the XDA conference in Florida, Miami.  The vulnerability exists on various LG devices, including the flagship LG Optimus G, on a number of Android…

Read More
Threat Research July 31, 2013

A Practical Attack Against MDM Solutions

We’re looking forward to presenting today at BlackHat USA 2013. It’s going to be our first time taking the stage at BlackHat Las Vegas – and we’re excited! As our title says – this is…

Read More
Threat Research January 30, 2013

Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation

Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible to existing antivirus defenses. These techniques, known as “crypting,” enable malware writers to create unknown variants of proven, highly effective…

Read More
Threat Research January 2, 2013

Malware Evolution: PC-based vs. Mobile

2012 signified the year where people started seriously thinking about mobile security and asking: how do we handle this new threat? The question was not merely one asked by uber-defense agencies (think back to Obama’s…

Read More