Check Point Blog

Threat Research September 8, 2016

Life After QuadRooter: Measuring The Impact

Following Check Point’s disclosure of QuadRooter at Black Hat USA on August 7, the free QuadRooter scanner app was downloaded over half a million times. The results of the scans Check Point collected show that…

Read More
Threat Research August 31, 2016

DressCode Android Malware Discovered on Google Play

The Check Point mobile threat prevention research team discovered a new Android malware on Google Play, called “DressCode,” which was embedded into more than 40 apps, and found in more than 400 additional apps on…

Read More
Threat Research August 24, 2016

The QuadRooter Domino Effect

Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities — both in hardware and software — can be found on the smartphones and tablets we trust with our sensitive…

Read More
Threat Research August 7, 2016

QuadRooter: New Android Vulnerabilities in Over 900 Million Devices

Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities…

Read More
Security Insights July 11, 2016

DIY Attribution, Classification, and In-depth Analysis of Mobile Malware

The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for…

Read More
Security Insights June 17, 2016

In The Wild: Mobile Malware Implements New Features

Malware developers just won’t stand still. They continue developing malware as they go, sometimes to adapt to the changing threat landscape, and sometimes simply to improve their capabilities. Recently, two examples of such advancements presented…

Read More
Security Insights June 8, 2016

Hack In The Box: Mobile Attackers Are Listening In

While most mobile attacks require some level of interaction with the user, Man-in-The-Middle (MiTM) attacks can achieve their goal without the user ever knowing they occurred. This type of attacks allows attackers to eavesdrop, intercept…

Read More
Security Insights June 3, 2016

In The Wild: Never a Dull Moment with Mobile Malware

Mobile malware learns fast. Every time new security measures come along, malware somehow manages to find a way to overcome them. This week we bring you such a story, with further details about Viking Horde,…

Read More
Security Insights June 1, 2016

Hack In The Box: Mobile Malware Goes In For The Kill

For attackers, installing a Trojan on your mobile device is the best way to attack it. Mobile malware provides attackers with a full arsenal of capabilities they can use to conduct several types of attacks…

Read More
Uncategorized May 29, 2016

OEMs Have Flaws Too: Exposing Two New LG Vulnerabilities

Check Point disclosed today two vulnerabilities (CVE-2016-3117, CVE-2016-2035) which can be used to elevate privileges on LG mobile devices to attack them remotely at the LayerOne 2016 conference in Los Angeles. LG issued fixes for both…

Read More