Check Point Blog

Security Insights June 8, 2016

Hack In The Box: Mobile Attackers Are Listening In

While most mobile attacks require some level of interaction with the user, Man-in-The-Middle (MiTM) attacks can achieve their goal without the user ever knowing they occurred. This type of attacks allows attackers to eavesdrop, intercept…

Read More
Security Insights August 12, 2015

SSH Decryption Opens Door to Very Old Security Vectors

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way. SSH uses the client-server model with public host key fingerprints in order to…

Read More
Threat Research April 26, 2014

Weekly Mobile Security News Roundup – Are your Mobile Apps Exposing Sensitive Data?

For the first time in several weeks, this week’s summary isn’t dominated by the OpenSSL vulnerability - Heartbleed. While Heartbleed may not breaking news anymore - we still recommend making it a priority to ensure your enterprise is protected from it. This week’s items serve as another reminder of the different ways an app or a device can expose sensitive data.

Read More