Mobile devices are critical to every organization’s digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. In fact, 20% of…
Read MoreCheck Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts overrides the user’s decision to disable ads showing outside of a legitimate context,…
Read MoreCheck Point’s mobile threat research team identified a new variant of an Android malware that sends fraudulent premium SMS messages and charges users’ accounts for fake services without their knowledge. According to Google Play data,…
Read More2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions. In 2016, we witnessed sophisticated new malware emerging on a regular basis,…
Read MoreI was delighted to read David Strom’s extremely favorable product review of Check Point SandBlast Mobile in CSO magazine a few weeks ago. Strom really puts SandBlast Mobile through the paces in the review, and…
Read MoreIf your enterprise is using Microsoft EMS and is looking to further secure mobile devices while ensuring employee’s privacy and productivity, you’d be happy to know that Check Point has teamed with Microsoft Intune to…
Read MoreCheck Point researchers discovered another widespread malware campaign on Google Play, Google’s official app store. The malware, dubbed “Judy”, is an auto-clicking adware which was found on 41 apps developed by a Korean company. The…
Read MoreOne of the most dangerous threats targeting mobile users is the banking malware. These malicious pieces of code are designed to steal financial information and transfer funds to their own accounts. Over the years, perpetrators…
Read MoreCheck Point researchers spotted a flaw in one of Android’s security mechanisms. Based on Google’s policy which grants extensive permissions to apps installed directly from Google Play, this flaw exposes Android users to several types…
Read MoreJust how susceptible are mobile devices to attacks in enterprise environments? It’s safe to say that mobile cyberattacks beset every business. For 12 months, Check Point analyzed data from 850 companies around the world, and…
Read More