<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The mobile banker threat – A to Z in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/The-mobile-banker-threat-A-to-Z/m-p/3411#M23</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"&lt;SPAN style="font-size: 13.0pt; font-family: 'Helvetica Neue'; color: #222222;"&gt;One of the most dangerous threats targeting mobile users is the banking malware. These malicious pieces of code are designed to steal financial information and transfer funds to their own accounts. Over the years, perpetrators successfully managed to&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;&lt;A href="http://blog.checkpoint.com/2016/02/02/cybercriminals-adapt-to-advanced-security-measures/"&gt;&lt;SPAN style="color: #e65785;"&gt;overcome all obstacles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;set before them, such as the&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;&lt;A href="http://blog.checkpoint.com/2016/02/19/in-the-wild-mobile-security-observations-from-the-check-point-research-team-5/"&gt;&lt;SPAN style="color: #e65785;"&gt;2-Factor-Authentication&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;security mechanism and defenses set in&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;&lt;A href="http://blog.checkpoint.com/2016/06/17/in-the-wild-mobile-malware-implements-new-features/"&gt;&lt;SPAN style="color: #e65785;"&gt;different Android versions&lt;/SPAN&gt;&lt;/A&gt;". For more info go to: &lt;A href="http://blog.checkpoint.com/2017/05/16/the-mobile-banker-threat-from-end-to-end/" title="http://blog.checkpoint.com/2017/05/16/the-mobile-banker-threat-from-end-to-end/"&gt;The mobile banker threat – from end to end | Check Point Blog&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 May 2017 11:26:33 GMT</pubDate>
    <dc:creator>Daniel_Dor</dc:creator>
    <dc:date>2017-05-22T11:26:33Z</dc:date>
    <item>
      <title>The mobile banker threat – A to Z</title>
      <link>https://community.checkpoint.com/t5/Mobile/The-mobile-banker-threat-A-to-Z/m-p/3411#M23</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"&lt;SPAN style="font-size: 13.0pt; font-family: 'Helvetica Neue'; color: #222222;"&gt;One of the most dangerous threats targeting mobile users is the banking malware. These malicious pieces of code are designed to steal financial information and transfer funds to their own accounts. Over the years, perpetrators successfully managed to&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;&lt;A href="http://blog.checkpoint.com/2016/02/02/cybercriminals-adapt-to-advanced-security-measures/"&gt;&lt;SPAN style="color: #e65785;"&gt;overcome all obstacles&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;set before them, such as the&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;&lt;A href="http://blog.checkpoint.com/2016/02/19/in-the-wild-mobile-security-observations-from-the-check-point-research-team-5/"&gt;&lt;SPAN style="color: #e65785;"&gt;2-Factor-Authentication&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;security mechanism and defenses set in&lt;SPAN class="apple-converted-space"&gt; &lt;/SPAN&gt;&lt;A href="http://blog.checkpoint.com/2016/06/17/in-the-wild-mobile-malware-implements-new-features/"&gt;&lt;SPAN style="color: #e65785;"&gt;different Android versions&lt;/SPAN&gt;&lt;/A&gt;". For more info go to: &lt;A href="http://blog.checkpoint.com/2017/05/16/the-mobile-banker-threat-from-end-to-end/" title="http://blog.checkpoint.com/2017/05/16/the-mobile-banker-threat-from-end-to-end/"&gt;The mobile banker threat – from end to end | Check Point Blog&lt;/A&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 May 2017 11:26:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/The-mobile-banker-threat-A-to-Z/m-p/3411#M23</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-05-22T11:26:33Z</dc:date>
    </item>
  </channel>
</rss>

