Check Point Blog

Threat Research March 15, 2014

Weekly Mobile Security News Roundup

The release of iOS 7.1 can serve as a metaphor for this week’s summary. Perhaps the most substantial part of Apple’s update was a major security patch that dealt with more than 40 issues. The patch addresses a vast range of different security flaws, signifying how diverse the world of malware is. It also says a lot about the security of iOS (presumed to be the more secure of the two main OSs) as well as about the robustness of the major players in the mobile world. Even (or maybe, especially) Apple and Google aren’t invulnerable to malware, let alone the smaller developers.

Read More
Threat Research March 7, 2014

Weekly Mobile Security News Roundup

This week’s summary sheds light on several emerging trends in the mobile malware world. As it grows and develops, malware is becoming the means to a new end (Crypto-Currency Mining for instance). The second major point focuses on the growing and evolving business of mobile malware – reputation, reliability and innovation are expected and required from malware creators and distributors.

Read More
Threat Research March 3, 2014

Weekly Mobile Security News Roundup

In some ways, this week’s summary somewhat highlights the polarity of the mobile security world. With the year’s biggest security conference in the form of RSA finishing today, we can see that while awareness to the severity and size of the issue of mobile security is growing and evolving, so are the threats.

Read More
Threat Research February 21, 2014

Weekly Mobile Security News Roundup

This week’s summary is a mix of articles that magnify the fact that boundaries between legitimate apps and malware, as well as the gaps between nation states and private hackers - are fading.

Read More
Threat Research February 19, 2014

The Spy in Your Pocket, Part 3: Cyber Risks to Android-based Devices

In this third and last entry in our short series overviewing mRATs, we’ll delve into the risks facing Android-based devices.

Read More
Threat Research February 17, 2014

The Spy in Your Pocket, Part 2: Cyber Threats to iOS

In this second entry in our short series overviewing mRATs, we’ll delve into the threats facing iOS.

Read More
Threat Research February 14, 2014

Weekly Mobile Security News Roundup

What's new on the mobile security front? From an uncovered APT campaign that had been running since 2007, to new Android research unveiled platform issues affecting the permissions, and Snapchat hacks. If you weren’t able to keep up with the news - we did it for you.

Read More
Threat Research February 12, 2014

AVPasser: When Widespread Malware Adopts Targeted Attack Capabilities

We’d like to draw your attention to another new Chinese malware for Android, named AVPasser. AVPasser looks like an advanced mRAT (Mobile Remote Access Trojan) and was first discovered by Chinese researchers. Our own follow-up research revealed a very interesting capability – self uninstall.

Read More
Threat Research February 10, 2014

The Spy in Your Pocket, Part 1: An Overview of Mobile Remote Access Trojans (mRATs)

We’re excited to present at the upcoming RSA 2014 at the end of the month. Our talk “Practical Attacks against MDM Solutions (and What You Can Do About It)” is going to focus on various threats to mobile devices and how mobile Remote Access Trojans (mRATs) are able to bypass current detection solutions. Leading up to the conference, we’d like to provide you with this short series overviewing mRATs.

Read More