Check Point researchers describe how they were able to take over the Instagram App using a malicious image Read more