Check Point Blog

Global Trends of the ‘Most Wanted’ Malware

The malware world continues to develop rapidly and dynamically. On a daily basis new malware appears, accelerating the cat-and-mouse game between attackers and defenders. As a result, it’s more important than ever for cyber security professionals to stay up-to-date about the ever-changing threat landscape in order to provide organizations with the highest level of protection.…

Read More
Uncategorized October 28, 2016

Check Point’s Cyber Security Predictions for 2017

2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no one is immune to sophisticated cyberattacks. According to the Identity Theft Resource Center, as of October 19th of this year…

Read More
Security Insights October 25, 2016

6 Tips to Outsmart the Phishermen

Brian Kernighan once said, “If you don’t understand viruses, phishing, and similar cyber threats, you become more susceptible to them.” With cyber scams constantly increasing in sophistication, this statement is especially true today. So, what exactly is phishing? In a phishing attack, a hacker creates an email that appears to be legitimate and sends it…

Read More
Security Insights October 24, 2016

September’s ‘Most Wanted’ Malware List: Ransomware in Top 3 for First Time

The Check Point Research Team revealed this week that ransomware attacks continued to rise in September. For the first time since the team launched the Threat Index, ransomware moved into the top three position of the most prevalent malware, with the Locky ransomware accounting for 6 percent of all recognized attacks globally during the month.…

Read More
Threat Research October 21, 2016

Phishing: Reeling in Enterprises for Hefty Profits

Can you believe that phishing, the scam that tricks users into giving away sensitive information like their credit card numbers and bank login credentials, is still with us after more than twenty years? Phishing is still here because criminals keep devising new ways to make it work. However, new phishing methods take more effort, but…

Read More
Security Insights October 19, 2016

Outstanding Results – Check Point Achieves 3rd NSS Recommended Rating This Year

Great news! I’m glad to report we achieved another NSS Recommended in their recent NGIPS Group Test! This is our 3rd NSS Recommended this year and our 13th since we began working with NSS Labs in 2011. The previous two tests this year measured our Next Generation Firewall capabilities and the Breach Detection System (advanced…

Read More
Security Insights October 18, 2016

Join Check Point at SecTor to learn how to go beyond traditional security with advanced threat prevention

Next week, Check Point will be at SecTor, Canada’s premier IT security education conference. The conference brings the world’s brightest (and darkest) minds together to identify, discuss, dissect and debate the latest digital threats facing corporations today. The conference has assembled a line-up of industry experts who will share some of the most engaging, educational…

Read More
Security Insights October 14, 2016

Android Updates: Hurry Up and Wait  

Google, device makers and carriers take too long to update Android vulnerabilities. In fact, while it takes Apple just days to update iOS when it finds a vulnerability, Threatpost points out that it can take Google weeks or even months to do the same for Android. Apple needed only ten days to fix Trident vulnerabilities in iOS, but it took Google…

Read More
Security Insights

4 Tips on How to Respond to a Ransomware Attack

Benjamin Franklin said, “An ounce of prevention is worth a pound of cure.” In the world of cyber security, it is indeed essential that organizations take steps to prevent ransomware from attacking their organizations and taking their data hostage. However, despite even the most extravagant and precautious preparations, some attacks may still get through. Knowing…

Read More
Security Insights October 12, 2016

Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment

At the Virus Bulletin conference yesterday in Denver, Check Point researchers Stanislav Skuratovich and Aliaksandr Chailytko gave a talk detailing how cyber security professionals can defeat sandbox evasion. In case you weren’t able to attend the conference, we’ve provided a summary of their presentation below. The malware world is a dynamic one. As soon as sandboxes appeared,…

Read More
Threat Research October 7, 2016