checkAd

     480  0 Kommentare Threat of Mobile Malware Continues to Grow as 'HummingBad' Attacks Move Up Check Point Research Rankings - Seite 2

    The top three mobile families all targeted Android devices:

    1. HummingBad - Android malware that establishes a persistent rootkit on the device, installs fraudulent applications, and enables additional malicious activity such as installing a key-logger, stealing credentials and bypassing encrypted email containers used by enterprises.
    2. AndroRAT - Malware that is able to pack itself with a legitimate mobile application and install without the user's knowledge, allowing a hacker full remote control of an Android device.
    3. Iop - Android malware that installs applications and displays excessive advertising by using root access on the mobile device. The amount of ads and installed apps makes it difficult for the user to continue using the device as usual.

    Nathan Shuchami, Head of Threat Prevention at Check Point, said: "Following its surprise entry into the top ten malware families worldwide in February, attacks using HummingBad are continuing to grow in volume. The fact that this previously unknown threat is already in the top ten global malware families for the entire first quarter of 2016 indicates just how real, and fast-growing the mobile malware danger is. Organizations' dependence on mobile devices grows every day, but mobile security still lags a long way behind network security. The need to apply effective protection to enterprise mobiles is now more urgent than ever."

    Check Point's threat index is based on threat intelligence drawn from its ThreatCloud World Cyber Threat Map, which tracks how and where cyberattacks are taking place worldwide in real time. The Threat Map is powered by Check Point's ThreatCloud™ intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, over 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily. 

    Check Point's Threat Prevention Resources are available at: http://www.checkpoint.com/threat-prevention-resources/index.html

    Follow Check Point via:
    Twitter: http://www.twitter.com/checkpointsw
    Facebook: https://www.facebook.com/checkpointsoftware
    Blog: http://blog.checkpoint.com
    YouTube: http://www.youtube.com/user/CPGlobal

    About Check Point Software Technologies Ltd.
    Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises' networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

    Seite 2 von 2





    Verfasst von Marketwired
    Threat of Mobile Malware Continues to Grow as 'HummingBad' Attacks Move Up Check Point Research Rankings - Seite 2 NICE, FRANCE and SAN CARLOS, CA--(Marketwired - Apr 19, 2016) -  At the company's annual customer event, the Check Point Customer Experience (CPX), Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today announced the most prevalent malware …