Research August 12, 2018 Man-in-the-Disk: Android Apps Exposed via External Storage Research By: Slava Makkaveev Recently, our researchers came across a shortcoming in the design of ...
Security August 12, 2018 Man-in-the-Disk: A New Attack Surface for Android Apps Recently, our researchers came across a shortcoming in the way Android apps use storage resources. ...
Security August 8, 2018 FakesApp: Using WhatsApp to Spread Scams and Fake News In a disturbing revelation, Check Point researchers have discovered a vulnerability in WhatsApp that allows ...
Research August 7, 2018 FakesApp: A Vulnerability in WhatsApp Research By: Dikla Barda, Roman Zaikin and Oded Vanunu As of early 2018, the Facebook-owned ...
Research August 5, 2018 Ramnit’s Network of Proxy Servers Research By: Alexey Bukhteyev As you may know, Ramnit is one of the most prominent banking ...
Security August 3, 2018 Black Hat USA 2018: Take the Check Point Cyber Challenge Next week, the doors to Black Hat USA 2018 open at Mandalay Bay in Las Vegas. ...
Securing the Cloud July 31, 2018 Get ISO 27001 Ready with Dome9! The ISO/IEC 27000 family of standards helps organizations protect their information and assets. ISO/IEC 27001 is a ...
Research July 31, 2018 Osiris: An Enhanced Banking Trojan Research By: Yaroslav Harakhavik and Nikita Fokin Following our recent analysis of the Kronos banking Trojan, ...
Security July 30, 2018 Dan Yerushalmi appointed as Head of Global Sales and Strategy We are excited to announce that Dan Yerushalmi has been appointed as Check Point’s new ...
Security July 30, 2018 Malvertising: The Illegal Form of Lying H.G.Wells once said that advertising is merely a legalized form of lying. In the age ...