Checkpoint Software Tech. (UK) Ltd. HOW MOBILE MALWARE COMPROMISES YOUR SECURE CONTAINERS AND ENTERPRISE CONTENT Check Point: How Mobile Malware Compromises Your Secure Containers and Enterprise Content | White Paper MORE ON BREAKING SECURE CONTAINERS: ANDROID On Android, in particular, there are other means of breaking into the secure container - without exploiting the device with a root vulnerability. The reason is that Android allows the installation of alternative keyboards as well as applications that take screenshots. An attacker can embed malicious code into these applications, turning these applications into actual keylogging and screen-capturing software. Consequently, any text which the user enters into the secure container –such as emails and documents – becomes privy to the attacker. A more illustrative example is that of Citrix. Mobile malware on a Citrix-supported device can grab all screenshots containing sensitive data and send it on to an attacker-controlled server. CHECK POINT MOBILE SECURITY: MITIGATING THE THREAT OF MOBILE MALWARE Check Point Mobile Security provides a mobile threat management platform that protects corporate data from cyber threats. Its patented technology detects vulnerabilities and prevents exploits on mobile devices, applications and in-network traffic, including advanced attacks aimed at bypassing secure containers, that others may miss. As a result, organizations have the mobile security they need, without impacting the end-user’s experience and privacy. Check Point’s capabilities include: Cloud-based analysis of device, application and network activity to identify and quantify the risks and vulnerabilities mobility poses to the organization. CONTACT US Identification of malicious activity, including privilege escalations, keylogging and screen-captures that represent an advanced, targeted attack. Detection and blocking of C&C activity when mobile malware attempts to exfiltrate information from the device. Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com ©2015 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] March 30, 2015 3 Please complete the form to gain access to this content Email * First name * Last Name * Access Now
Check Point: How Mobile Malware Compromises Your Secure Containers and Enterprise Content | White Paper MORE ON BREAKING SECURE CONTAINERS: ANDROID On Android, in particular, there are other means of breaking into the secure container - without exploiting the device with a root vulnerability. The reason is that Android allows the installation of alternative keyboards as well as applications that take screenshots. An attacker can embed malicious code into these applications, turning these applications into actual keylogging and screen-capturing software. Consequently, any text which the user enters into the secure container –such as emails and documents – becomes privy to the attacker. A more illustrative example is that of Citrix. Mobile malware on a Citrix-supported device can grab all screenshots containing sensitive data and send it on to an attacker-controlled server. CHECK POINT MOBILE SECURITY: MITIGATING THE THREAT OF MOBILE MALWARE Check Point Mobile Security provides a mobile threat management platform that protects corporate data from cyber threats. Its patented technology detects vulnerabilities and prevents exploits on mobile devices, applications and in-network traffic, including advanced attacks aimed at bypassing secure containers, that others may miss. As a result, organizations have the mobile security they need, without impacting the end-user’s experience and privacy. Check Point’s capabilities include: Cloud-based analysis of device, application and network activity to identify and quantify the risks and vulnerabilities mobility poses to the organization. CONTACT US Identification of malicious activity, including privilege escalations, keylogging and screen-captures that represent an advanced, targeted attack. Detection and blocking of C&C activity when mobile malware attempts to exfiltrate information from the device. Worldwide Headquarters | 5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected] U.S. Headquarters | 959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233 | www.checkpoint.com ©2015 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] March 30, 2015 3
Related Resources Checkpoint Software Tech. (UK) Ltd. Network Boundaries Have Gone Mobile Read more Checkpoint Software Tech. (UK) Ltd. CHECK POINT SANDBLAST ZERO-DAY PROTECTION: THE BES... Read more Checkpoint Software Tech. (UK) Ltd. THE TOP 6 CYBER SECURITY THREATS TO IOS DEVICES Read more Checkpoint Software Tech. (UK) Ltd. DEMYSTIFYING MOBILE SECURITY ATTACKS Read more Checkpoint Software Tech. (UK) Ltd. THE TOP 4 CYBER SECURITY THREATS TO ANDROID MOBILE... Read more Checkpoint Software Tech. (UK) Ltd. 3 STEPS TO IMPLEMENTING AN EFFECTIVE BYOD MOBILE S... Read more Checkpoint Software Tech. (UK) Ltd. EXPOSING THE UNKNOWN: HOW SANDBOXING TECHNOLOGY FI... Read more Checkpoint Software Tech. (UK) Ltd. THREAT RESEARCH: TARGETED ATTACKS ON Enterprise E... Read more Load more
© 2024 Infotech Crowd. All rights reserved. Privacy Policy Cookies Policy Advertise with us Back to top