Research April 6, 2016 Ransomware: Cybercriminals New Attack of Choice In recent years, we’ve seen banker malware as the most prominent threat in the cyber ...
Research April 6, 2016 Congrats! More than 7000 applications in your database Security managers will appreciate Check Point’s Application Control Software Blade. With more than 7000 pre-defined ...
Research April 5, 2016 New Technology Strives to Keep Android Apps and Users Safe Mobile applications are intended to be safe for use, protecting users’ privacy. However, many of ...
Research April 4, 2016 New Locky Ransomware Variant Implementing Changes in Communication Patterns Recently, Check Point published a detailed report describing Locky, an emerging new ransomware threat, which ...
Research April 4, 2016 It’s Time to ReThink Security Management “You never change things by fighting the existing reality. To change something, build a new ...
Research April 1, 2016 Angler EK Malvertising via Hacked Revive Adserver Malware are spread by various methods such as phishing emails, malicious URLs, and more. One ...
Research April 1, 2016 Check Point Threat Alert: Ransomware Campaigns Using .JS Inside Archives Recently there is noticeable increase in using JavaScript files inside archives as a means to ...