Check Point Blog

Research May 18, 2016

Hack In The Box: How Attackers Manipulate Root Access and Configuration Changes

Securing iOS and Android smartphones and tablets is still a relatively new concept. Taking control of a mobile device was once considered an unlikely threat because it was hard to do. However, malware has moved…

Read More
November 17, 2014

Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach?

Just over a week ago, we published an in-depth look at “WireLurker,” one of the most advanced attacks on Mac OS X and iOS devices. WireLurker is the first malware that affects both platforms and…

Read More