Research July 26, 2016 Ransomware: what you need to know In recent years, there has been a surge of ransomware attacks. It’s been reported all ...
Security July 22, 2016 Securely Embrace the Hybrid Cloud The trend in enterprise IT is to move from a hardware-centric to an application-centric network ...
Research July 21, 2016 The Cure for Your Private Cloud Security Blues Hot off the heels of Cisco Live! in Las Vegas, there’s a continued buzz about ...
Research July 20, 2016 Check Point Forensics: CTB-Faker Ransomware SandBlast Agent Forensics Introduction The concept is quite simple: we run a malware sample on ...
Research July 18, 2016 Top 10 Most Wanted Malware Check Point Software Technologies today published its latest Threat Index, revealing the number of active ...
Security July 14, 2016 Ransomware’s Motto: The Simpler, The Scarier, The Better A lot has been said about the ransomware epidemic. The number of infections worldwide increases ...
Security July 13, 2016 Stop Before You (Pokemon) GO The excitement over the new game Pokemon GO has taken the world by storm. Because ...
Research July 11, 2016 Malware’s Constant Evolution Requires Advanced Protections Malware developers are fast learners. They adapt to new security measures in record time and ...
Research July 11, 2016 DIY Attribution, Classification, and In-depth Analysis of Mobile Malware The security research community has been dealing with malware attribution and classification for decades. The ...
Research July 8, 2016 Jigsaw Ransomware Decryption The Jigsaw ransomware was first spotted in April 2016, and has since received a ...