Check Point Blog

Harmony January 5, 2018

LightsOut: Shining a Light On Malicious Flashlight Apps on Google Play

Check Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts overrides the user’s decision to disable ads showing outside of a legitimate context,…

Read More
Harmony April 25, 2017

SandBlast Mobile receives highest security score in independent test

Great news!  Miercom conducted the first independent, hands-on test of mobile threat defense products and Check Point SandBlast Mobile received Miercom’s Certified Secure Award! This is Miercom’s highest award for achievement in competitive, hands-on testing…

Read More
Research October 14, 2016

Android Updates: Hurry Up and Wait  

Google, device makers and carriers take too long to update Android vulnerabilities. In fact, while it takes Apple just days to update iOS when it finds a vulnerability, Threatpost points out that it can take Google weeks or even months…

Read More
Research September 22, 2016

Gartner Recognizes the Importance of Mobile Threat Defense

HummingBad. Stagefright. QuadRooter. Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend –…

Read More
Research September 21, 2016

On Their Best Behavior: Securing iOS and Android in the Enterprise

In today’s business environment, using mobile devices isn’t just a business requirement, it’s an employee expectation. But for some organizations, these devices present security challenges that prevent or limit their ability to support a fully…

Read More
Research September 16, 2016

In The Wild: App Stores Are No Sanctuary for Mobile Malware

Most mobile users rely on Google Play and the Apple App Store for their safety and assume that by downloading only highly-rated apps from these stores keeps them safe from mobile malware. In the past,…

Read More
Research August 29, 2016

Beware of the Trident Exploits

Researchers from The Citizen Lab at the University of Toronto last week revealed a sophisticated zero-day attack on the iPhone of Ahmed Mansoor, a human rights activist in the United Arab Emirates. The Citizen Lab…

Read More
Research July 11, 2016

DIY Attribution, Classification, and In-depth Analysis of Mobile Malware

The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for…

Read More
Research June 17, 2016

In The Wild: Mobile Malware Implements New Features

Malware developers just won’t stand still. They continue developing malware as they go, sometimes to adapt to the changing threat landscape, and sometimes simply to improve their capabilities. Recently, two examples of such advancements presented…

Read More
Research June 8, 2016

Hack In The Box: Mobile Attackers Are Listening In

While most mobile attacks require some level of interaction with the user, Man-in-The-Middle (MiTM) attacks can achieve their goal without the user ever knowing they occurred. This type of attacks allows attackers to eavesdrop, intercept…

Read More