Check Point: How Mobile Malware Compromises Your Secure Containers and Enterprise Content | White Paper MORE ON BREAKING SECURE CONTAINERS: ANDROID On Android, in particular, there are other means of breaking into the secure container - without...
Check Point SandBlast Zero-Day Protection | White Paper Inspecting files and clearing them before they enter into a network should be a best practice, but is actually relatively recent. Ease of implementation and minimal impact on the user...
The Top 6 Cyber Security Threats to iOS Devices | White Paper 4. WiFi Man in the Middle (MitM) A MitM attack occurs when the device connects to a rogue WiFi hotspot. Since all communications are passed through the attacker-controlled network device,...
Check Point: Demystifying Mobile Security Attacks | White Paper IOS MALWARE DELIVERED USING FAKE ENTERPRISE OR DEVELOPER CERTIFICATES WHAT IT DOES AND HOW IT WORKS iOS malware delivered using fake certificates is malicious software installed on a...
Check Point: The Top 4 Cyber Security Threats to Android Mobile Devices | White Paper 4. ZERO-DAY ATTACKS Zero-day attacks represent exploits of vulnerabilities that have been uncovered – but not yet released. Many times, these vulnerabilities...
Check Point: 3 Steps to Implementing an Effective BYOD Mobile Security Strategy | White Paper 1. UNDERSTANDING THE RISKS AND VALUE OF MOBILITY TO YOUR STAKEHOLDERS The key to securing your mobility is to first understand how it is being used in your...
Exposing the Unknown: How Sandboxing Technology Fights Modern Threats | White Paper Cybercriminals don’t discriminate. Advanced persistent threats have targeted both large and small organizations alike. You don’t have to be a government agency,...
Check Point Threat Research: Targeted Attacks on Enterprise Mobile ABOUT MRATS Commercial mRATs are applications sold worldwide for the primary purposes of spying on people or monitoring children’s safety. mRAT applications today are also used to...