Check Point Blog

Security Insights September 22, 2016

Gartner Recognizes the Importance of Mobile Threat Defense

HummingBad. Stagefright. QuadRooter. Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend –…

Read More
Security Insights September 21, 2016

On Their Best Behavior: Securing iOS and Android in the Enterprise

In today’s business environment, using mobile devices isn’t just a business requirement, it’s an employee expectation. But for some organizations, these devices present security challenges that prevent or limit their ability to support a fully…

Read More
Security Insights July 11, 2016

DIY Attribution, Classification, and In-depth Analysis of Mobile Malware

The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for…

Read More
Threat Research July 1, 2016

From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign

For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of Yingmob, a group of Chinese cyber criminals behind the HummingBad malware campaign. HummingBad is a malware Check Point discovered in…

Read More
Security Insights May 20, 2016

In The Wild: Malware in Google Play is as Prevalent and Pesky as Ever

Not a week passes without new malware found on Google Play and this week was no different. Among the malware found are both new and old samples, including a known malicious banker and a new…

Read More
Security Insights May 12, 2016

Hack In The Box: System Vulnerabilities Can Leave Mobile Devices Exposed

System vulnerabilities are a major threat facing users and enterprises today, and these need to be remedied thoughtfully. Since these vulnerabilities don’t require social engineering schemes to become exposed, and because they have an alarmingly…

Read More
Security Insights February 3, 2016

Super Bowl Cybercrime

Super Bowl 50 is coming to my hometown and, along with it, over a million devoted fans who’ll pack events, concerts and restaurants from San Francisco to Santa Clara. That week they, along with fellow…

Read More
Threat Research December 4, 2015

In The Wild: Mobile Security Observations from the Check Point Research Team

We already know mobile threats are becoming more and more sophisticated every day. As cyber criminals exploit new vulnerabilities, they also discover new techniques that make it easier to attack our smartphones and tablets. Most…

Read More
Security Insights December 1, 2015

Check Point’s Security Predictions for 2016

At the beginning of last year, Check Point’s top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS. These predictions…

Read More
Security Insights November 13, 2015

In The Wild: Mobile Security Observations from the Check Point Research Team

As security researchers, we see worrisome vulnerabilities on both iOS and Android every day. Cybercriminals know that smartphones and tablets hold massive amounts of data, so they’re using creative techniques to hack into mobile devices…

Read More