Accurate threat detection and efficient response are critical components of preventing advanced attacks on smartphones and tablets. Traditional anti-virus and app reputation solutions can identify known threats, but they can’t detect zero-day malware or vulnerabilities in networks, operating systems, SMS messages, and apps.
Everybody uses public Wi-Fi® hotspots, but there are easy ways to fool users into joining fake, malicious networks. Cybercriminals use these man-in-the-middle (MitM) attacks to intercept communications between two or more parties, allowing them to capture or alter data in transit. Two common kinds of MitM attacks are SSL stripping and SSL bumping. SSL stripping circumvents automatic redirection to secure HTTPS connections, and SSL bumping uses fake SSL certificates to fool apps and browsers into believing they’re using private web connections.
SandBlast Mobile’s SMS Phishing Protection feature detects malicious links, including tiny URLs, in SMS messages and alerts the user through the SandBlast Mobile Protect app notifications. The user is provided detailed information about the threat, with a recommendation to delete the message. Once the message is deleted, the alert is removed.
Check Point ThreatCloud is the first collaborative network to fight cybercrime. It is a knowledge base that delivers real-time, dynamic security intelligence. That intelligence is used to identify emerging outbreaks and threat trends. ThreatCloud also powers the SMS phishing protection capability for SandBlast Mobile, investigating malicious IP, URL, and DNS addresses.
Apps are an easy, effective way for cybercriminals to launch sophisticated, targeted attacks. That’s because most users implicitly trust apps they install no matter from where they’re downloaded. Making matters worse, most users don’t understand or read the permissions they grant during installation. Malicious apps can enable a host of activities like exfiltration of sensitive data, or remotely seizing control of sensors like the camera and microphone to spy on users and their surroundings. The best way to protect devices and data from these risks is to take a multi-layered approach to detecting and stopping app-based threats.
Much like a person can be identified by his or her unique fingerprint, malicious code in apps can be uncovered by looking for unique binary signatures. These scans provide an important first line of defense, but known malware families can be obfuscated, allowing them to bypass signature-based solutions. As part of its behavioral analysis, Check Point SandBlast Mobile immediately detects patterns of known attacks, but it also uses a number advanced detection methods designed to uncover unknown or zero-day threats AV signature scans alone cannot detect.
Some trustworthy apps can exhibit risky behavior. This causes false-positive headaches for IT and a poor experience for end users who might be blocked from using completely safe apps. Facebook, for example, syncs and uploads contact details, calendar records and even records voice during status updates.
Gaining root access to a smartphone or tablet (also called “rooting” on Android and “jailbreaking” on iOS) is no longer something just gadget enthusiasts do so they can tinker with a device. Root access enables a wide range of customizations, and it gives users more access to do as they please with their devices. It also gives cybercriminals greater access, which exposes devices and data to risk.
Check Point Sandblast Mobile
PRICE ON REQUEST
Search Software Easily