Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2015-02-27 15:54:37 |
(Déjà vu) iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly (lien direct) |
The post iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly |
|
|
★★
|
|
2015-02-24 15:06:20 |
Is Software Defined Protection the New Software Defined Networking? (lien direct) |
Software Defined Networking (SDN) is the latest buzz term to take over the networking world – and is not to be overlooked. With the goal of automating network infrastructure functions that used to be fixed or manual, the aim is to take complex configuration tasks and make them programmable. When implemented correctly, it should make […]
|
|
|
|
|
2015-02-20 22:24:23 |
Angler Exploit Kit – Blocking Attacks Even Before Zero Day (lien direct) |
The Story Blocking attempts to use exploit kits (EK) against our customers is one of Check Point’s main targets in IPS. Thus, our Intelligence Teams follow closely the trends in this world. On late December, we noticed hype around a specific EK, namely, Angler EK, and decided to give high priority to writing an IPS […]
|
|
|
|
|
2015-02-19 22:22:22 |
Malware Analysis 101 (lien direct) |
Introduction A common misconception about malware is the great difficulty of performing malware analysis and the technical requirements involved. When many technical users are faced with a malware infection and asked to analyze it, they may think, “Hey, I’ve heard about this kind of malware. I’ve even read some malware reports, and they sound really […]
|
|
|
|
|
2015-02-19 20:45:14 |
Malware Analysis – CTB-Locker (lien direct) |
Executive Summary CTB (Curve-Tor-Bitcoin) Locker is a crypto-ransomware variant. It is based on advanced algorithms which are used in different combinations, making CTB-Locker significantly more difficult to detect and neutralize. CTB-Locker (aka Critroni or Onion) is based on a so-called encryptor, which encrypts all of a user's personal data and extorts payment to decrypt the […]
|
|
|
|
|
2015-02-19 12:51:46 |
Targeted Attacks on Enterprise Mobile Exposed in New Threat Research (lien direct) |
The post Targeted Attacks on Enterprise Mobile Exposed in New Threat Research |
|
|
|
|
2015-02-13 16:42:30 |
(Déjà vu) New Android Trojans, Gremlins Inside Play, iPhone\'s Safe and Sound – Mobile Security Weekly (lien direct) |
The post New Android Trojans, Gremlins Inside Play, iPhone's Safe and Sound – Mobile Security Weekly |
|
|
★★
|
|
2015-02-10 16:20:39 |
Demystifying iOS Enterprise Certificates (lien direct) |
The post Demystifying iOS Enterprise Certificates |
|
|
★★★★★
|
|
2015-02-06 17:37:08 |
(Déjà vu) iOS Attacked (Again), Play\'s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly (lien direct) |
The post iOS Attacked (Again), Play’s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-02-06 17:31:26 |
Your Malware Would Like To Phone a Friend (lien direct) |
The post Your Malware Would Like To Phone a Friend |
|
|
★★★
|
|
2015-02-05 17:30:43 |
Clever and Persistent Android Banking Trojan Discovered (lien direct) |
The post Clever and Persistent Android Banking Trojan Discovered |
|
|
★★★★★
|
|
2015-02-03 21:02:35 |
Cyberthieves Can Score a Data Touchdown with Unencrypted Apps (lien direct) |
The post Cyberthieves Can Score a Data Touchdown with Unencrypted Apps |
|
|
★★★
|
|
2015-01-30 15:55:55 |
(Déjà vu) Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly (lien direct) |
The post Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-01-26 20:52:08 |
Threat Advisory – CVE-2014-7911: A New Root Exploit for Android (lien direct) |
The post Threat Advisory – CVE-2014-7911: A New Root Exploit for Android |
|
|
★★
|
|
2015-01-23 16:49:54 |
(Déjà vu) Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly (lien direct) |
The post Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly |
|
|
★★
|
|
2015-01-20 18:58:29 |
Presto Change-o, Pixel Battery Saver Transforms into Potential Malware (lien direct) |
The post Presto Change-o, Pixel Battery Saver Transforms into Potential Malware |
|
|
★★★★★
|
|
2015-01-16 15:05:13 |
(Déjà vu) Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly (lien direct) |
The post Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-01-09 15:05:24 |
(Déjà vu) Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly (lien direct) |
The post Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-01-09 01:25:54 |
Diving into a Silverlight Exploit and Shellcode – Analysis and Techniques (lien direct) |
In recent years, exploit-kits have become one of the most common platforms for malware distribution. One of the exploits coming from Infinity exploit-kit exploits a security vulnerability in Microsoft Silverlight. Compared to other technologies like Java, PDF, Flash, etc. – Silverlight exploits are less common. Just to get a rough feeling, according to cvedetails.com, from […]
|
|
|
|
|
2014-12-31 16:47:54 |
Mobile Security 2014: The Year In Review (lien direct) |
The post Mobile Security 2014: The Year In Review |
|
|
|
|
2014-12-27 03:42:17 |
Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping (lien direct) |
The post Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping |
|
|
|
|
2014-12-23 11:14:53 |
Your Website Should Reflect Your Brand – Not an Attacker\'s (lien direct) |
When IT professionals and business owners think about their security strategies, they often forget about one of the easiest assets for cyber criminals to attack: their websites. From consumer brands to small businesses to large enterprise companies, a website is the front-facing identity of any organization, and needs to be given the same security. iPage […]
|
|
|
|
|
2014-12-22 16:31:09 |
What Does Fast Threat Emulation Mean? (lien direct) |
Your IT department has probably deployed multiple kinds of defenses to protect your network from malware. We are all familiar with antivirus and intrusion prevention programs. They protect us from known threats and are our first line of protection defense. Known threats are characterized and stored in a threat database. The more we know, the […]
|
|
|
|
|
2014-12-19 22:10:57 |
(Déjà vu) Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware (lien direct) |
The post Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware |
|
|
|
|
2014-12-18 18:40:41 |
(Déjà vu) Misfortune Cookie: The Hole in Your Internet Gateway (lien direct) |
What is the Misfortune Cookie vulnerability? Misfortune Cookie is a critical vulnerability that allows an intruder to remotely take over a residential gateway device and use it to attack the devices connected to it. Researchers from Check Point's Malware and Vulnerability Research Group recently uncovered this critical vulnerability present on millions of residential gateway (SOHO […]
|
|
|
|
|
2014-12-15 20:46:57 |
Mobile Security: Coming Soon To A Theater Near You (lien direct) |
The post Mobile Security: Coming Soon To A Theater Near You |
|
|
|
|
2014-12-12 16:48:35 |
Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open (lien direct) |
The post Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open |
|
|
|
|
2014-12-10 16:52:25 |
Aren\'t All Security Threat Emulations the Same? (lien direct) |
You should be picky when selecting a security solution for your network. When it comes to comparing solutions, are there really any metrics other than speed and accuracy? Those are certainly two of the most important, but there are some other important features as well. Our top three would be: 1. Access to the largest […]
|
|
|
|
|
2014-12-09 17:00:13 |
How we Collect Infections by the Numbers? (lien direct) |
We have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack all the time. Hackers have a lot of time on their hands and there is little downside for them to […]
|
|
|
|
|
2014-12-05 17:05:08 |
Sharing a Heritage of Innovation and “The Right Stuff†(lien direct) |
Last month, we introduced Capsule, a new way of securing your mobile environment and your critical documents. Today, we commend the United States and another capsule of innovation, the Orion. For those who missed the launch and landing, it brought to me the same thrill I felt as a kid, when I witnessed the Apollo […]
|
|
Heritage
|
|
|
2014-12-05 16:42:16 |
(Déjà vu) Mobile Security Weekly: Uber\'s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again (lien direct) |
The post Mobile Security Weekly: Uber’s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again |
|
Uber
|
|
|
2014-12-03 17:29:16 |
Let\'s Be Fair and Test Technology the Same Way We Use It. (lien direct) |
More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once an email hits their inbox, it has been scanned and is safe to open. But is it? We created the […]
|
|
|
|
|
2014-12-01 17:31:54 |
(Déjà vu) Man in the Binder: He Who Controls the IPC Controls the Droid (lien direct) |
At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the IPC, Controls the Droid.†Nitay and Idan's research of Android's unique operating system (OS) architecture showed the potential capture of […]
|
|
|
|
|
2014-11-28 16:47:58 |
Mobile Security Weekly: Black Friday Security Threats, On Sale Now! (lien direct) |
The post Mobile Security Weekly: Black Friday Security Threats, On Sale Now! |
|
|
|
|
2014-11-25 16:04:29 |
Has Your Android Device Been Fakedebuggered? (lien direct) |
The post Has Your Android Device Been Fakedebuggered? |
|
|
|
|
2014-11-21 19:21:32 |
(Déjà vu) Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy (lien direct) |
The post Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy |
|
|
|
|
2014-11-21 16:39:53 |
A Look Ahead: Mobile Security Predictions for 2015 (lien direct) |
The post A Look Ahead: Mobile Security Predictions for 2015 |
|
|
|
|
2014-11-20 17:34:49 |
New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition (lien direct) |
If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the performance of five security products. They specifically focused on products claiming superior performance for Advanced Threat Detection to determine the […]
|
Guideline
|
|
|
|
2014-11-20 17:21:47 |
A Billion Android Devices Exposed - Are you at risk? (lien direct) |
The post A Billion Android Devices Exposed — Are you at risk? |
|
|
|
|
2014-11-18 01:29:25 |
Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach? (lien direct) |
The post Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach? |
|
|
|
|
2014-11-14 16:45:56 |
Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up (lien direct) |
The post Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up |
|
|
|
|
2014-11-12 08:15:47 |
When it Comes to Security, What is Good Enough? (lien direct) |
Ben Franklin once said that an ounce of prevention is better than a pound of cure. We couldn't agree more when it comes to network security. From both time and financial standpoints, it is much more cost effective to prevent infections than deal with their aftermath. Infection cleanup is very costly to businesses. The latest […]
|
|
|
|
|
2014-11-10 17:45:06 |
(Déjà vu) Immobilize WireLurker Before It Immobilizes You (lien direct) |
A recent malware, “WireLurkerâ€, affects Apple OS X and iOS. As highlighted in the recent announcement by Check Point on mobile security, the amount of mobile malware is on the rise. In this case, WireLurker affects both desktop and mobile platforms. The infection starts through trojanized and repackaged OS X applications. It then transfers to […]
|
|
|
|
|
2014-11-06 17:53:10 |
WireLurker Exposes iOS Security – Jailbreak Not Required (lien direct) |
The post WireLurker Exposes iOS Security – Jailbreak Not Required |
|
|
|
|
2014-11-03 17:47:22 |
At the heart of Zero Day are 1440 minutes. What can happen in one minute? (lien direct) |
At Check Point, we live in the same business world everyone else does, where we have to operate at the speed of our customers. In our case, though, one mistake impacts a lot more than just our own network. The speed of business and being responsive to customers and stakeholders is a key metric for […]
|
|
|
★★★★★
|
|
2014-11-03 08:24:41 |
Plugging the Security Hole in a WordPress Plug-In (lien direct) |
Check Point researcher, Roi Paz recently discovered a critical vulnerability that would have enabled attackers to steal personal and financial data from thousands of websites and their visitors via the LiveSupporti WordPress plug-in. After being alerted to the situation, LiveSupporti plugged the security hole. LiveSupporti is a software service that enables website visitors to engage in […]
|
|
|
★★
|
|
2014-10-31 16:40:32 |
(Déjà vu) Mobile Security Weekly – Three New But Classic iOS and Android Attacks (lien direct) |
The post Mobile Security Weekly – Three New But Classic iOS and Android Attacks |
|
|
★★★
|
|
2014-10-24 17:47:44 |
(Déjà vu) Mobile Security Weekly – iOS Jailbroken, Knox Cracked, Android Exposed (Again) (lien direct) |
The post Mobile Security Weekly – iOS Jailbroken, Knox Cracked, Android Exposed (Again) |
|
|
★★
|
|
2014-10-06 17:57:21 |
Bug in the Bug Tracker (lien direct) |
On September 29th, Check Point's Malware and Vulnerability Research Group uncovered a critical privilege escalation vulnerability in the popular bug-tracking platform called Bugzilla. According to the CVE security vulnerability database (cvedetails.com), this is the first privilege escalation bug uncovered in the Bugzilla project since 2002. (See also: Bugzilla Zero-Day Exposes Zero-Day Bugs by Brian Krebs) […]
|
|
|
★★
|
|
2014-10-04 06:43:48 |
(Déjà vu) Mobile Security Weekly – Lacoon Discovers the Xsser mRAT (lien direct) |
The post Mobile Security Weekly – Lacoon Discovers the Xsser mRAT |
|
|
★★★★
|