Two new rooting tools against a wide spectrum of Android devices, ranging from version 4.0 till 4.4, were recently found. These tools allow an adversary to bypass the Android permission model and gain full control…
Read MoreSummary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…
Read MoreSummary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…
Read MoreThere’s a lot of buzz regarding LinkedIn’s new iOS app – Intro. Some are hailing it, others hate it. To clarify what’s going on, we’ve put together this FAQ.
Read MoreMichael Shaulov, CEO, Lacoon Mobile Security As a founder, I view the launch by first looking back at all that we’ve accomplished in the past two years. The first four months that Ohad and I…
Read MoreYesterday, Public Intelligence – mainly, a public repository of government documents – released a joint DHS-FBI report “Threats to Mobile Devices Using the Android Operating System” (find it here). Granted, the report hasn’t been validated…
Read MoreA new vulnerability exploiting LG Android devices was published just yesterday at the XDA conference in Florida, Miami. The vulnerability exists on various LG devices, including the flagship LG Optimus G, on a number of Android…
Read MoreWe’re looking forward to presenting today at BlackHat USA 2013. It’s going to be our first time taking the stage at BlackHat Las Vegas – and we’re excited! As our title says – this is…
Read MoreSummary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible to existing antivirus defenses. These techniques, known as “crypting,” enable malware writers to create unknown variants of proven, highly effective…
Read More2012 signified the year where people started seriously thinking about mobile security and asking: how do we handle this new threat? The question was not merely one asked by uber-defense agencies (think back to Obama’s…
Read More