Innovation December 21, 2017 Huawei Routers Exploited to Create New Botnet A Zero-Day vulnerability in the Huawei home router HG532 has been discovered and hundreds of ...
Security December 13, 2017 What Lies Ahead? Cyber-Security Predictions for 2018 Arnold H. Glasow famously quipped that “the trouble with the future is that it usually ...
Research November 20, 2017 The Danger Behind Santa’s Beard Santa’s beard is usually white, the colour of purity and innocence. However, cyber-criminals targeting online ...
Innovation November 13, 2017 October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form ...
Research November 7, 2017 Check Point IoT Blog Series: ‘Home, Smart Home’ – But How Secure Is It? The smart home is often idealized as a domestic paradise — your fridge orders your ...
Security October 26, 2017 HomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent ...
Security October 18, 2017 Boleto: The Perfect ‘Inside Job’ Banking Malware The Brazilian cyberspace is known to be a whole ecosystem of its own and, although ...
Security October 17, 2017 Baby, Who Can Drive My Car? This is the third post in our IoT blog series. Read the first post about ...
Research October 12, 2017 September’s Most Wanted Malware: Locky Shoots Back Up Global Rankings Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks ...
Security October 10, 2017 Check Point IoT Blog Series: Smart Cities Need Smart Security The second in our Check Point IoT series, read our first post about securing IoT ...