Check Point Blog

DressCode Android Malware Discovered on Google Play

The Check Point mobile threat prevention research team discovered a new Android malware on Google Play, called “DressCode,” which was embedded into more than 40 apps, and found in more than 400 additional apps on third party app stores. Check Point notified Google about the malicious apps, and some have already been removed from Google…

Read More
Threat Research August 31, 2016

Check Point Spearheads Threat Prevention Security for Small and Medium Businesses

Small and medium-sized business owners typically think the security that protects their large enterprises counterparts is well out of reach in terms of costs and complexities. However recent shifts in the threat landscape have them rethinking their security strategies. Cybercriminals are equal opportunists who leverage the same tactics used on bigger enterprises to target smaller…

Read More
Security Insights

Whaling: The Hunt for High Profile Business Targets

What are whaling attacks? “Whaling” attacks, also called Business Email Compromise (BEC), are a newer form of phishing attack. Phishing attacks consist of messages sent to would-be victims that try to deceive them into clicking malicious links, or opening an attachment that contains malware. Phishing attacks have evolved drastically, in part due to growing awareness…

Read More
Security Insights August 30, 2016

Beware of the Trident Exploits

Researchers from The Citizen Lab at the University of Toronto last week revealed a sophisticated zero-day attack on the iPhone of Ahmed Mansoor, a human rights activist in the United Arab Emirates. The Citizen Lab discovery exposed three zero-day exploits used by “Pegasus,” a lawful interception cyberespionage tool developed by the Israeli-based NSO Group and…

Read More
Threat Research August 29, 2016

Web Scripting Language PHP-7 Vulnerable to Remote Exploits

Exploiting server side bugs is a jackpot for hackers. Users tend to keep their data in one big pot – the server. This allows attackers to focus on one target, instead of individual users, making it possible for them to achieve greater results. This approach has been extremely profitable for attackers with various goals ranging…

Read More
Threat Research August 26, 2016

Advancing the Security of Your SDDC

VMworld US is rapidly approaching and we’ve been busy gearing up for a great show! In fact, the product team has been especially busy building new features and capabilities into our vSEC Cloud Security product portfolio which we’ll showcase during VMworld. While businesses of all sizes are making significant strides to virtualize networks and leverage…

Read More
Security Insights August 25, 2016

The QuadRooter Domino Effect

Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities — both in hardware and software — can be found on the smartphones and tablets we trust with our sensitive data. Until a patch for a vulnerability is installed, an affected device is exposed. That’s why fixing vulnerabilities like QuadRooter…

Read More
Threat Research August 24, 2016

The Evolution of Proxy

When I entered the security market nearly 20 years ago, the philosophical and almost religious debate was whether proxy was a better technology than stateful inspection. Back then stateful firewalls were all about access control and proxy servers were interrupting a web connection to prevent direct internet exposure, and the “smart” ones were able to…

Read More
Security Insights

Phishing scams target everyone – even us!

Phishing scams have been around for over twenty years. It appears unlikely that they will ever go away. Targeting anyone with an email address, they continue to be a persistent threat. Recently, even some of Check Point’s executives were recently targeted. The below email, purportedly from PayPal, is an example of emails that potential victims…

Read More
Threat Research August 23, 2016

Check Point Forensic Files: Proving Ranscam ransomware does not provide a way to recover files

Every week we see new ransomware variants as cyber criminals continue to generate revenue from holding victims’ files for ransom. In July, a new ransomware was discovered that is an out-and-out scam. It does not encrypt any files; it simply deletes all user files. It then demands a ransom for recovery of the files, but…

Read More
Threat Research August 22, 2016