Research February 16, 2016 Future-Proof Security Management Cyber security is about more than stopping threats; it is also about maintaining a robust ...
Research February 12, 2016 Love is in the air (along with malware in your email): Facebook email redirection used to overcome spam filtering Every year in the middle of February, much of the world takes a brief moment ...
Research February 11, 2016 Campaign Targeting WordPress: Users being Redirected to Angler Exploit Kit In the past week, a massive campaign targeting WordPress-based websites has been reported by several ...
Healthcare February 11, 2016 Managing the Complex Ecosystem of Healthcare Security Healthcare is one of several industries that has made tremendous strides with integrating advanced technology ...
Research February 10, 2016 Too Much Freedom is Dangerous: Understanding IE 11 CVE-2015-2419 Exploitation It’s been a while since a pure JavaScript vulnerability was widely used by exploit kits. ...
Research February 9, 2016 Introducing Check Point SandBlast Agent As the modern workplace continues to evolve, it becomes increasingly important that individual end-user devices ...
Research February 5, 2016 In The Wild: Mobile Security Observations from the Check Point Research Team Every day, it seems, our research team encounters new ways hackers can infiltrate your mobile ...
Research February 4, 2016 HummingBad: A Persistent Mobile Chain Attack Check Point Mobile Threat Prevention has detected a new, unknown mobile malware that targeted two ...
Research February 3, 2016 Super Bowl Cybercrime Super Bowl 50 is coming to my hometown and, along with it, over a million ...
Research February 3, 2016 Size Doesn’t Matter in Cybersecurity Has the landscape of small business security improved over the last few years? This is ...