What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2014-08-17 03:15:40 (Déjà vu) Mobile Security Weekly – Bringing the Hammer Down on Mobile Threats (lien direct) The post Mobile Security Weekly – Bringing the Hammer Down on Mobile Threats ★★★★
Checkpoint.webp 2014-08-16 21:50:36 Practical Attacks Against VDI and Augmenting Mobile Security (lien direct) The post Practical Attacks Against VDI and Augmenting Mobile Security ★★
Checkpoint.webp 2014-08-13 13:38:04 Are Malicious Configuration Profiles iOS\' Achilles Heel? (lien direct) The post Are Malicious Configuration Profiles iOS’ Achilles Heel? ★★★
Checkpoint.webp 2014-08-12 13:50:36 (Déjà vu) Mobile Security Weekly – Android Threats Stack Up (lien direct) The post Mobile Security Weekly – Android Threats Stack Up ★★★★
Checkpoint.webp 2014-08-11 18:12:30 Check Point Protects from the HAVEX Malware Targeting ICS/SCADA Systems (lien direct) Dragonfly Cyber Espionage campaign overview Havex is a Remote Administration Tool (RAT) used recently by the “dragonfly” cyber espionage group. They were using the Havex malware to target Industrial Control Systems (ICS) and SCADA systems at energy companies across Europe and the US. Several methods were used to infect computers with the Havex RAT, such […] ★★★
Checkpoint.webp 2014-08-11 18:08:56 GOZ – Is it game over, Zeus? (lien direct) Overview Zeus is a highly sophisticated family of Trojans that seeks to steal banking information and accounts from victims. Zeus targets popular operating systems such as Windows and Android and is usually distributed to end-users through social engineering tactics such drive-by downloads and phishing emails. Although Zeus was discovered back in 2007, it remains popular […] ★★★★
Checkpoint.webp 2014-08-11 18:05:29 Protecting computers from the damages of RAMDO Click Fraud Trojan (lien direct) Details Ramdo is a family of Trojan horses which performs click fraud. This type of Trojan program is used to increase the number of visits on certain websites or to boost the number of hits for online ads. Ramdo installs itself by using an exploit kit, copies itself onto the system and creates an encrypted […] ★★
Checkpoint.webp 2014-08-11 08:42:13 Don\'t Become the Next Code Spaces: Learn best practices for using cloud services securely (lien direct) Overview Code Spaces, which offered source code repositories and project management services hosted in Amazon's Web Services for developers, was forced to cease operations in June after failing to meet the demands of cyber-extortionists. The company was first hit with a Distributed Denial of Service (DDoS) attack, followed by a devastating cyber breach that, in an instant, […] ★★
Checkpoint.webp 2014-08-04 13:30:56 VDI Solutions: Background, Threats & Mitigation (lien direct) The post VDI Solutions: Background, Threats & Mitigation ★★★★★
Checkpoint.webp 2014-08-02 12:01:08 (Déjà vu) Mobile Security Weekly – Countdown to Blackhat US (lien direct) The post Mobile Security Weekly – Countdown to Blackhat US ★★★★★
Checkpoint.webp 2014-07-29 11:42:47 Android \'Fake ID\' can Impersonate your Trusted Apps (lien direct) The post Android 'Fake ID' can Impersonate your Trusted Apps ★★★
Checkpoint.webp 2014-07-27 11:37:28 (Déjà vu) Mobile Security Weekly – Trust Issues (lien direct) The post Mobile Security Weekly – Trust Issues ★★★★★
Checkpoint.webp 2014-07-22 16:10:45 (Déjà vu) In 2014, No Country is Safe from Mobile Threats (lien direct) If you have been reading recent malware studies and articles, you may have noticed that many different different countries have been named as the ones “most targeted” or with the “most new mobile threats” ★★★
Checkpoint.webp 2014-07-19 21:48:50 (Déjà vu) Mobile Security Weekly – Applenterprise ? (lien direct) This week's news focuses on the business of mobile. Unlike most weeks, where we touch on a new strain of mobile malware or a new vulnerability - this week presents a different point of view on mobile security. It's critical to keep up to date with this sort of events, as in the long run they will undoubtedly impact all aspects of mobile security in the enterprise. ★★★★★
Checkpoint.webp 2014-07-12 22:41:57 Mobile Security Weekly – Have we seen the last of KNOX? (Update – 20th July) (lien direct) Android takes the lead in mobile security news this week. With major decisions being made regarding how Google views the future of Android security, they've received another big wakeup call - between 60-70% of Android devices are vulnerable to a substantial vulnerability. iOS users also discovered another blow to their security this week. Several months ago, our researchers at Lacoon Security discovered a vulnerability in the Gmail iOS app which enables a threat actor to perform a Man-in-the-Middle attack - and by doing so, view, and even modify, encrypted communications. Guideline ★★★★
Checkpoint.webp 2014-07-10 15:11:05 Security Disclosure: Google\'s iOS Gmail App Potential Target for Threat Actors (lien direct) Security Disclosure: As part of our ongoing research into Apple's iOS environment, we analyze mobile apps from various perspectives. During a routine analysis of the Gmail iOS app we unexpectedly came across a vulnerability which enables a threat actor that is performing a Man-in-the-Middle attack to view, and even modify, encrypted communications. The Vulnerability: Gmail's iOS App Does Not Perform Certificate Pinning. ★★
Checkpoint.webp 2014-07-05 18:21:30 (Déjà vu) Mobile Security Weekly – Threats are Everywhere (lien direct) This week's issue contains four entirely different but all highly volatile mobile security threats. New vulnerabilities and threat vectors are rapidly appearing. These aren't small issues either - they potentially place millions of devices and users in danger and all need receive due attention. ★★★
Checkpoint.webp 2014-07-02 18:14:40 (Déjà vu) Is Android Fragmentation making the OS as fragile as glass? (lien direct) What is fragmentation and how does it affect the security of the Android-based devices? Join our podcast where Dan Koretsky, our sr. security researcher at Lacoon Security, provides a brief overview of Android fragmentation and its implications on enterprise security.
Checkpoint.webp 2014-06-28 19:31:34 Mobily Security Weekly – Pain-gu? How dangerous is the new iOS jailbreak? (lien direct) The post Mobily Security Weekly – Pain-gu? How dangerous is the new iOS jailbreak?
Checkpoint.webp 2014-06-25 12:43:02 Pangu: An iOS 7.1 Jailbreaking Tool – a Major Leap in Attacker\'s Capabilities (lien direct) A jailbreaking tool, named Pangu, for Apple-based mobile devices running iOS 7.1-7.1.x was released yesterday on June 24, 2014. Pangu should concern us - the security community, enterprises, and consumers alike. Pangu represents a major technology leap, ultimately lowering the barrier for attackers to create sophisticated mobile-targeted attacks.
Checkpoint.webp 2014-06-22 06:15:30 (Déjà vu) Mobile Security Weekly – Paranoid Android? (lien direct) The post Mobile Security Weekly – Paranoid Android? ★★★★★
Checkpoint.webp 2014-06-20 20:14:17 (Déjà vu) Follow Up on “TowelRoot” Vulnerability (lien direct) The post Follow Up on “TowelRoot” Vulnerability
Checkpoint.webp 2014-06-16 19:49:45 “TowelRoot” Gives Root Access to Samsung Galaxy S5 and other Popular Android Mobile Devices (lien direct) The post “TowelRoot” Gives Root Access to Samsung Galaxy S5 and other Popular Android Mobile Devices
Checkpoint.webp 2014-06-16 09:18:13 Heartbleed: A Look Into the new Threat on the Block (lien direct) What is Heartbleed and how does it work? Earlier this month, the Security teams at Codenomicon and Google Security discovered the critical security bug known as Heartbleed (CVE-2014-0160). This vulnerability has been found in versions 1.0.1 through 1.0.1f of the popularly used OpenSSL cryptographic software, providing an easy path for attackers to access very sensitive […]
Checkpoint.webp 2014-06-15 09:08:45 (Déjà vu) Mobile Security Weekly – New tech = Friend or Foe? (lien direct) This week's update focuses on the technological advancement dilemma: simplicity vs security. With some of their new updates, both Google and Apple seem to be voting firmly in one direction - and it doesn't seem to be security. We also can't possibly ignore the FIFA World Cup that kicked off in Brazil on Thursday. We've tried to provide a few security tips that might help users that are planning to travel to Brazil to take part in the festivities. ★★★★★
Checkpoint.webp 2014-06-07 23:20:00 (Déjà vu) Mobile Security Weekly – Cupid is here, but he\'s not spreading love. (lien direct) Only two items this week, but both discuss attacks that may be capable of causing quite a bit of havoc in the near future. One reminds us that the biggest mobile security of 2014 hasn't yet finished while the other poses questions about things to come. ★★★★★
Checkpoint.webp 2014-06-06 16:57:45 Customer Advisory – a slice of humble “Pie” for Android (lien direct) The post Customer Advisory – a slice of humble “Pie” for Android ★★
Checkpoint.webp 2014-05-30 13:59:35 (Déjà vu) Mobile Security Weekly – Google, Apple & Facebook are causing problems (lien direct) The post Mobile Security Weekly – Google, Apple & Facebook are causing problems ★★
Checkpoint.webp 2014-05-25 06:06:29 (Déjà vu) Mobile Security Weekly – Remote Mobile Management & Security Issues (lien direct) The post Mobile Security Weekly – Remote Mobile Management & Security Issues ★★★★
Checkpoint.webp 2014-05-23 06:19:12 Security Alert: New Android Malware Spreading Aggressively – Read this FAQ. (Updated) (lien direct) On Friday, May 16, a new strain of Android malware that has been attacking Israeli Android devices was identified. This strain has now spread to other countries making this a global problem. This post should answer most of the early questions about the malware named Foto_Album.
Checkpoint.webp 2014-05-21 12:19:06 Mitigating the effects of Social Engineering in the Enterprise (lien direct) The post Mitigating the effects of Social Engineering in the Enterprise
Checkpoint.webp 2014-05-17 20:44:49 Mobile Security Weekly – Malware hits 2 million milestone (lien direct) This week's summary is dominated by an aggressive new Android worm attacking Israeli Android devices. The rest of the roundup comprises of quite a diverse mix of issues. We've got newly discovered problems with Android OS, app developers failing their users as well the news that mobile malware has reached a new milestone - 2 million different instances. This wide range just goes to show how many different ways mobile malware is evolving.
Checkpoint.webp 2014-05-13 21:40:09 (Déjà vu) Mobile Phishing – Why are users still getting hooked? (Social Engineering Ep. 5) (lien direct) The post Mobile Phishing – Why are users still getting hooked? (Social Engineering Ep. 5)
Checkpoint.webp 2014-05-10 21:10:05 (Déjà vu) Mobile Security Weekly – Mobile Malware goes Global (lien direct) The post Mobile Security Weekly – Mobile Malware goes Global
Checkpoint.webp 2014-05-06 09:27:25 Rogue WiFi Hotspots – Why getting coffee is putting your enterprise at risk (Social Engineering Ep. 4) (lien direct) Most people don't think twice before connecting to a free public Wi-Fi hotspot at a coffee shop, airport, or hotel. If someone is providing free WiFi, users will usually connect first and think later. With rogue Wi-Fi hotspots growing in numbers, it's becoming much more critical to monitor connectivity.
Checkpoint.webp 2014-05-02 19:43:00 Mobile Security Weekly – Mobile Malware finds new ways to steal from victims (lien direct) This week's summary serves as a reminder that mobile malware is developing and advancing on several different fronts. On one front, attacker are finding new ways to target and exploit victims as well as to bypass security measures. In another front, attackers are continuing to find ways to attack the biggest and most established apps on the market.
Checkpoint.webp 2014-04-29 16:15:08 Mobile Scareware – Bringing Scary Back (Social Engineering Ep. 3) (lien direct) With this entry, we continue our series on common methods of social engineering that target mobile devices. This time around, we discuss "Scareware”.
Checkpoint.webp 2014-04-28 18:19:00 Bleeding-in-the-Browser – Why Downplaying of Reverse Heartbleed Risk for Mobile is Dangerous to the Enterprise (lien direct) The post Bleeding-in-the-Browser – Why Downplaying of Reverse Heartbleed Risk for Mobile is Dangerous to the Enterprise ★★★★★
Checkpoint.webp 2014-04-26 15:44:46 Weekly Mobile Security News Roundup – Are your Mobile Apps Exposing Sensitive Data? (lien direct) For the first time in several weeks, this week's summary isn't dominated by the OpenSSL vulnerability - Heartbleed. While Heartbleed may not breaking news anymore - we still recommend making it a priority to ensure your enterprise is protected from it. This week's items serve as another reminder of the different ways an app or a device can expose sensitive data. ★★★★★
Checkpoint.webp 2014-04-22 17:07:21 Fake Applications: Why mobile users can\'t judge a book by its cover. (Social Engineering Ep. 2) (lien direct) The post Fake Applications: Why mobile users can't judge a book by its cover. (Social Engineering Ep. 2) ★★★★
Checkpoint.webp 2014-04-18 15:14:35 (Déjà vu) Weekly Mobile Security News Roundup – Heartbleed Leaves Mobile Users Vulnerable to Attacks (lien direct) Another week of mobile security news has been mostly dominated by the after effects of the discovery of Heartbleed. It's becoming apparent that fears regarding the magnitude of the event weren't exaggerated. With Heartbleed based PC attacks already being reported, this issue is still evolving. ★★★★★
Checkpoint.webp 2014-04-15 16:13:57 (Déjà vu) Heartbleed Product Update – Lacoon Customers Are Protected (lien direct) The post Heartbleed Product Update – Lacoon Customers Are Protected
Checkpoint.webp 2014-04-13 00:45:34 Is your Mobile Device Vulnerable to the Heartbleed Bug? Test it now. (lien direct) The post Is your Mobile Device Vulnerable to the Heartbleed Bug? Test it now.
Checkpoint.webp 2014-04-10 18:37:52 Social Engineering – Why mobile users are their own worst enemy (lien direct) In this post, we survey the most common and in some ways, the most dangerous method, of social engineering in the mobile security domain – Malicious Advertising, or “Malvertising”.
Checkpoint.webp 2014-04-09 18:28:49 Microsoft Ends Support of Windows XP, Internet Explorer 8 and Office 2003 (lien direct) 10 April 2014   The Issue:   Starting April 8, 2014, Microsoft will no longer provide security updates or technical support for Windows XP, Office 2003 and Internet Explorer 8. Without additional security updates, organizations should consider these PCs may be at risk for new vulnerabilities and malware.   Microsoft is advising users with these […]
Checkpoint.webp 2014-04-09 09:20:09 It\'s Alive: The Resurgence of ZeroAccess Botnet (lien direct) Check Point Malware Research Group, 04/02/2014 Summary Through leveraging Check Point's ThreatCloud security intelligence, in recent weeks, our vulnerability research team has detected a spike in ZeroAccess botnet activity. This is surprising given that this botnet was taken down by law enforcement, working in conjunction with Microsoft, in mid-December 2013. Despite this enforcement action, it […]
Checkpoint.webp 2014-04-08 18:30:57 Threat Emulation Identifies Spear Phishing Attack Using Near-Zero-Day Malware (lien direct) Summary On October 22, 2013, Check Point's ThreatCloud Threat Emulation service analyzed suspicious documents sent by email to end users at a media company. Analysis of the malware, which was intercepted through a Message Transport Agent (MTA) configuration and sent to the Threat Emulation Service for sandboxing, revealed that the documents exploited a vulnerability in […]
Checkpoint.webp 2014-04-02 13:53:24 Sounds like a Vulnerability, eh Mate? The new HTC One M8 Vulnerability (lien direct) Last week, the first exploit for the HTC One M7 and the brand new HTC One M8 - two of the most popular available smartphones today - was published. The significance? The vulnerability behind this exploit means that any app, regardless of its permission set, can run the exploitable code in order to gain root access (i.e. remove all of Android's built-in security mechanisms).
Checkpoint.webp 2014-03-14 09:40:06 Security Updates in iOS 7.1 – Reading Between the Lines (lien direct) The post Security Updates in iOS 7.1 – Reading Between the Lines
Checkpoint.webp 2014-02-19 15:00:49 (Déjà vu) The Spy in Your Pocket, Part 3: Cyber Risks to Android-based Devices (lien direct) In this third and last entry in our short series overviewing mRATs, we'll delve into the risks facing Android-based devices.
Last update at: 2024-06-26 15:08:57
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter