Research February 29, 2016 “Recommended” for Security Effectiveness and Value 5 Years in a Row by NSS Labs The Next Generation Firewall (NGFW) is the cornerstone of any effective network security strategy. However ...
Research February 26, 2016 The Mobile World is an Amazing Place – Mobile World Congress 2016 Mobile World Congress may be in the rearview mirror, but it’s still top of mind. ...
Research February 25, 2016 Check Point and IBM: A Collaborative Approach to Information Security Security is hard. Internal and external customers demand continuous availability, and the business often initiates ...
Research February 24, 2016 Adwind – Malware-as-a-Service Reincarnation Executive Summary Adwind Remote Access Tool, known by various names due to its many reincarnations, ...
Research February 22, 2016 Check Point Threat Alert: Locky Ransomware Locky is a new type of ransomware which encrypts the victim’s files and then demands ...
Research February 21, 2016 Join Check Point at Mobile World Congress 2016 Everything today really is mobile. From the smartphones in our pockets to the infrastructure that ...
Research February 19, 2016 In the Wild: Mobile Security Observations from the Check Point Research Team Time goes by fast, and mobile malware develops faster still. In the past few weeks, ...
Research February 19, 2016 Smoking Is Bad For You We recently spotted what seemed to be another spam campaign, yet a deeper investigation revealed ...
Research February 18, 2016 The Return of the Brazilian Banker Trojan Brazil. It is known as the land of carnivals, beaches, coconuts – and vicious phishing ...
Research February 17, 2016 Millions of AirDroid Users Exposed to Severe Vulnerability Check Point alerted AirDroid that its Android device manager app is vulnerable to phone data ...