Security May 29, 2016 OEMs Have Flaws Too: Exposing Two New LG Vulnerabilities Check Point disclosed today two vulnerabilities (CVE-2016-3117, CVE-2016-2035) which can be used to elevate privileges ...
Harmony May 27, 2016 Check Point Named a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls Today’s enterprise networks are more complex than ever. Cloud computing, floods of connected devices and ...
Research May 27, 2016 Attacks on SMB are a sure thing, according to the latest Verizon report It’s not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. ...
Research May 27, 2016 CryptXXX Ransomware: Simple, Evasive, Effective CryptXXX emerged a few weeks ago and it’s been sneaky! It’s most impressive feature is ...
Research May 26, 2016 Spam-Riding Dropper Packs a One-Two Ransomware, Adware Punch The Most Trusty Attack Vector Shady random strangers on the internet often have an uncanny ...
Research May 25, 2016 Weaponized WordPress Tools WordPress is a free, open source content management system (CMS) for creating websites, and is considered ...
Research May 25, 2016 Hack In The Box: Malware Disguises Itself To Infiltrate Your Device No user would intentionally allow malware onto a mobile device, so it’s obvious why malicious ...
Research May 24, 2016 TeslaCrypt Ransomware Shuts Down: One Down, Plenty to Go In a surprising turn of events, the creators of the notorious TeslaCrypt ransomware shut down ...
Research May 24, 2016 The Scripting Threat: How Admin Tools Became Dominant in the Malware Attack Lifecycle Malware have increasingly adopted scripts as a major technique, replacing file-based execution. This transition took ...
Research May 20, 2016 In The Wild: Malware in Google Play is as Prevalent and Pesky as Ever Not a week passes without new malware found on Google Play and this week was ...