Check Point Blog

Hacking the Smartphone | Mobile Cyber Hack Demonstration

The post Hacking the Smartphone | Mobile Cyber Hack Demonstration appeared first on Check Point Research.

Read More
Research May 30, 2017

2017-5-29 Global Cyber Attack Reports

TOP ATTACKS AND BREACHES Security researchers have revealed a new malvertising campaign called RoughTed. According to the researchers, RoughTed is able to bypass ad blockers and is used for scams and exploit kits. Fraudulent actors are taking advantage…

Read More
Research May 29, 2017

BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools

Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in the wrong hands. On April 14, 2017, a group known as the Shadow Brokers released a large portion of the stolen cyber…

Read More
Threat Research May 25, 2017

The Judy Malware: Possibly the largest malware campaign found on Google Play

Check Point researchers discovered another widespread malware campaign on Google Play, Google’s official app store. The malware, dubbed “Judy”, is an auto-clicking adware which was found on 41 apps developed by a Korean company. The malware uses infected devices to generate large amounts of fraudulent clicks on advertisements, generating revenues for the perpetrators behind it.…

Read More
Mobile Malware

Hacked in Translation Demo

The post Hacked in Translation Demo appeared first on Check Point Research.

Read More
Research May 23, 2017

WannaCry: How to Protect Yourself

The post WannaCry: How to Protect Yourself appeared first on Check Point Research.

Read More
Research

WannaCry: How to Protect Yourself Webinar

The post WannaCry: How to Protect Yourself Webinar appeared first on Check Point Research.

Read More
Research

Introducing Check Point Anti-Ransomware: Defeat Cyber Extortion

The post Introducing Check Point Anti-Ransomware: Defeat Cyber Extortion appeared first on Check Point Research.

Read More
Research

Hacked in Translation – from Subtitles to Complete Takeover

Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles. By crafting malicious subtitle files, which are then downloaded by a victim’s media player, attackers can take complete control over any type of device via vulnerabilities found in many popular streaming platforms, including VLC, Kodi (XBMC), Popcorn-Time…

Read More
Threat Research

Check Point R80.10 Maximizes Security and Minimizes Operational Overhead for CCI Nice Côte D’Azur, Creating a “WOW” Effect

Security threats and attackers continue to adapt their techniques, making it more difficult than ever for organizations to protect themselves. When the CCI Nice Côte D’Azur upgraded to Check Point’s R80.10 Security Management, it increased threat prevention performance, efficiency, and visibility while reducing operational overhead.   In a recent chat with Frédéric Achache, IT Projects Manager…

Read More
Security Insights May 22, 2017