<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FAQ: Can SandBlast Mobile detect the &amp;quot;Cloak and Dagger&amp;quot; attack? in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/FAQ-Can-SandBlast-Mobile-detect-the-quot-Cloak-and-Dagger-quot/m-p/3494#M27</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SandBlast Mobile &lt;SPAN style="color: #3ec165;"&gt;&lt;STRONG&gt;detects the "Cloak and Dagger"&lt;/STRONG&gt;&lt;/SPAN&gt; attack. More information on this attack can be seen here:&lt;/P&gt;&lt;P&gt;&lt;A href="http://securityaffairs.co/wordpress/59468/hacking/cloak-and-dagger-attack.html" title="http://securityaffairs.co/wordpress/59468/hacking/cloak-and-dagger-attack.html"&gt;Millions of Android devices exposed to the Cloak and Dagger attackSecurity Affairs&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The permissions that are being requested by the "Cloak and Dagger" attack are a common practice by different malware. More information on such types of attacks can be seen here on Check Point's Mobile Security Blog: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://blog.checkpoint.com/2017/05/09/android-permission-security-flaw/" rel="nofollow"&gt;http://blog.checkpoint.com/2017/05/09/android-permission-security-flaw/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 28 May 2017 13:23:21 GMT</pubDate>
    <dc:creator>Daniel_Dor</dc:creator>
    <dc:date>2017-05-28T13:23:21Z</dc:date>
    <item>
      <title>FAQ: Can SandBlast Mobile detect the "Cloak and Dagger" attack?</title>
      <link>https://community.checkpoint.com/t5/Mobile/FAQ-Can-SandBlast-Mobile-detect-the-quot-Cloak-and-Dagger-quot/m-p/3494#M27</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SandBlast Mobile &lt;SPAN style="color: #3ec165;"&gt;&lt;STRONG&gt;detects the "Cloak and Dagger"&lt;/STRONG&gt;&lt;/SPAN&gt; attack. More information on this attack can be seen here:&lt;/P&gt;&lt;P&gt;&lt;A href="http://securityaffairs.co/wordpress/59468/hacking/cloak-and-dagger-attack.html" title="http://securityaffairs.co/wordpress/59468/hacking/cloak-and-dagger-attack.html"&gt;Millions of Android devices exposed to the Cloak and Dagger attackSecurity Affairs&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The permissions that are being requested by the "Cloak and Dagger" attack are a common practice by different malware. More information on such types of attacks can be seen here on Check Point's Mobile Security Blog: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://blog.checkpoint.com/2017/05/09/android-permission-security-flaw/" rel="nofollow"&gt;http://blog.checkpoint.com/2017/05/09/android-permission-security-flaw/&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 28 May 2017 13:23:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/FAQ-Can-SandBlast-Mobile-detect-the-quot-Cloak-and-Dagger-quot/m-p/3494#M27</guid>
      <dc:creator>Daniel_Dor</dc:creator>
      <dc:date>2017-05-28T13:23:21Z</dc:date>
    </item>
  </channel>
</rss>

