Banking trojans are on the rise: here’s how to avoid being robbed

 
Banking trojans are helping cybercriminals to commit the perfect crime:  stealing money from the accounts of unsuspecting victims, almost untraceably and at minimal risk.  As such it’s no surprise that from June to December 2016, banking trojans were only fractionally behind ransomware in being the most prevalent type of malware, and in Asia-Pacific countries they far outstripped ransomware in the number of attacks.  So how do banking trojans work, and how can users protect themselves against an online bank robbery? First, banking trojans are among the stealthiest of all malware types.  After a banking trojan infects a user’s PC or web browser, it will lie dormant and wait for ...

March’s ‘Most Wanted’ Malware List: Exploit Kits Rise Again in Popularity

 
Old malware rarely dies:  it just lies dormant for a while.  This was one of the key findings of the Check Point Research Team’s latest Global Threat Impact Index, which saw a surge in the usage of Exploit Kits during March, following a steady decline in usage since a high point in May 2016. Exploit Kits are designed to discover and exploit vulnerabilities on machines in order to download and execute further malicious code.  The leading variants were Angler and Nuclear, and their demise saw Exploit Kits fall out of the leading malware used to launch attacks on organizations worldwide. However, in March, the Rig Exploit Kit shot up the rankings, being the second most prevalent ...

SandBlast Receives ‘Recommended’ Rating Once Again

 
Hackers continue to target organizations with advanced malware. With over 390,000 new malware variants created each day1, traditional security solutions don’t stand a chance in this cat and mouse game. Organizations are constantly striving to ensure protections are top notch to defend their organizations against ever-persistent cyber attackers. An essential ingredient to successfully block unknown malware and zero-day threats is an integrated, advanced sandbox, like Check Point SandBlast Zero-Day Protection. Sandblast inspects files in a safe, virtual environment to discover malicious behavior before it enters the network; and its advanced CPU-level detection identifies and stops ...