Our Blog

Everything You Need to Know About Mobile Security

fakeid

Android ‘Fake ID’ can Impersonate your Trusted Apps

Jul 29, 2014 | Ohad Bobrov, VP R&D, Lacoon Security

Google bug 13678484, aka Android ‘Fake ID’, was just disclosed. What’s this vulnerability all about?

Read More >
trust_fall

Mobile Security Weekly – Trust Issues

Jul 27, 2014 | Ohad Bobrov, VP R&D, Lacoon Security

Three items populate this week’s news summary. The one thing they have in common is the element of trust. Apple is in danger of losing users’ trust – it seems to be intentionally hiding things that might put them in danger. Users are also being made aware that they need to think long and hard before trusting the sites and services they use – whether it’s a banking site or a message from the “F.B.I”.

Read More >
World Map interconnected by wire (Fiber Optics) of the Info.

In 2014, No Country is Safe from Mobile Threats

Jul 22, 2014 | Ohad Bobrov, VP R&D, Lacoon Security

If you have been reading recent malware studies and articles, you may have noticed that many different different countries have been named as the ones “most targeted” or with the “most new mobile threats”

Read More >
apple-ibm

Mobile Security Weekly – Applenterprise ?

Jul 19, 2014 | Ohad Bobrov, VP R&D, Lacoon Security

This week’s news focuses on the business of mobile. Unlike most weeks, where we touch on a new strain of mobile malware or a new vulnerability – this week presents a different point of view on mobile security. It’s critical to keep up to date with this sort of events, as in the long run they will undoubtedly impact all aspects of mobile security in the enterprise.

Read More >
gmail-protection

Mobile Security Weekly – Have we seen the last of KNOX? (Update – 20th July)

Jul 12, 2014 | Ohad Bobrov, VP R&D, Lacoon Security

Android takes the lead in mobile security news this week. With major decisions being made regarding how Google views the future of Android security, they’ve received another big wakeup call – between 60-70% of Android devices are vulnerable to a substantial vulnerability. iOS users also discovered another blow to their security this week. Several months ago, our researchers at Lacoon Security discovered a vulnerability in the Gmail iOS app which enables a threat actor to perform a Man-in-the-Middle attack – and by doing so, view, and even modify, encrypted communications.

Read More >