How The Spectre/Meltdown Vulnerabilities Work

 
The Spectre and Meltdown vulnerabilities recently discovered in Intel, AMD and ARM processors, are fairly complex. In this post we will try to simplify what the problem is, how it could affect your business and what actions can be taken to protect against it. It is important to begin by clarifying that despite their two names, both Spectre and Meltdown are essentially based on the same observation. This observation is a weakness behind the common implementation of speculative execution. What Is Speculative Execution? With the rate of computing power said to double every two years, CPU engineers are tasked with ensuring computers are able to run faster and faster in order to carry ...

Mitigating CPU Vulnerabilities: Removing the OS Blindfold

 
OS Level Solutions Are Not Enough The recent Meltdown and Spectre vulnerabilities target weaknesses of the CPU rather than the Operating System, or the applications that run on it. (See here for background on how these vulnerabilities work). Since they do not involve the Operating System, solutions that monitor at that level, such as traditional sandboxes, will be incapable of detecting these types of attack. A lower level framework is required in order to properly identify and mitigate these attacks.   Using The CPU Level Framework To Mitigate The Spectre and Meltdown Vulnerabilities CPU Level framework was introduced into the family of SandBlast Advanced Threat ...

NSS Recommends Check Point for Advanced Threat Prevention

 
Check Point's NSS BPS Test Highlights: Lowest TCO per Mbps Highest security effectiveness with 100% block rate Results achieved via a single, consolidated gateway We are pleased to announce that Check Point achieved NSS Recommended in the recent NSS Labs Breach Prevention System (BPS) test. Using a single consolidated 15600 gateway, Check Point achieved the highest security effectiveness score and the lowest total cost of ownership (TCO). This was NSS Labs’ first test of advanced threat prevention products where the ability to prevent – rather than detect - attacks was tested, and provides independent validation of our assertion that done correctly, cyber-attacks ...

What Lies Ahead? Cyber-Security Predictions for 2018

 
Arnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we’re ready for it.”  The past year certainly took us by surprise when the WannaCry and Petya ransomware outbreaks hit businesses globally, causing unprecedented disruption, while serious new vulnerabilities such as BlueBorne were discovered in almost every connected device in use.   While these large-scale attacks and vulnerabilities dominated news headlines, there were other significant cybersecurity trends developing behind the scenes which also have the potential to disrupt peoples’ daily lives.   These trends are the result of our increasing reliance on ...

November’s Most Wanted Malware: Return of Necurs Botnet Brings New Ransomware Threat

 
During the month of November, the Necurs botnet has returned to Check Point’s Global Threat Index’s top ten most prevalent malware. Check Point researchers found that hackers were using Necurs, considered to be the largest spam botnet in the world, to distribute the relatively new Scarab ransomware that was first seen in June 2017. The Necurs botnet started mass distribution of Scarab during the U.S. Thanksgiving holiday, sending over 12 million emails in a single morning. Necurs has previously been used to distribute some of the most insidious malware variants to hit business networks in the past 12 months, including the Locky and Globeimposter families. The re-emergence of the ...

Webinar: Examining The Latest Trends In Enterprise Mobile Cyberattacks

 
The explosive proliferation of personal smartphones and tablets in the workplace exposes companies to increased risk of cyberattacks. How bad can it be? Threats to mobile users are myriad and powerful, and hackers are ultimately capable of compromising any device, accessing sensitive data at any time. For the past year Check Point mobile threat researchers analyzed data from 850 businesses around the world and determined that every business was attacked at least once. This landmark cybersecurity study is the first to assess actual threat data of corporate-owned and bring-your-own devices. Don't miss Check Point’s latest webinar on December 7, entitled “Mobile Cyberattacks Impact ...

77% of Android Devices Still Endanger Users Due to Design Flaws

 
Researchers have discovered a design flaw in Android that can be used to remotely capture screenshots or record audio… without the user’s knowledge or consent.   The attack relies on the MediaProjection service in Android, which has these extensive capabilities, and was made available for the use of non-propriety apps since Android version 5.0 (Lollipop). While apps are required to receive the user's permission to use this service, the new attack uses a screen overlay tactic to deceive them into granting it unknowingly.   At the time of publication, Google has only fixed the issue in Android version 8.0 (Oreo), leaving Android versions 5.0, 6.0 and 7.0, which ...

Uber Takes Cloud Security For A Ride

 
Cloud security has had a rough ride of it recently, and this past week its driver was the $68bn global transportation company, Uber.   Earlier this week, it was revealed that the personal details of Uber’s 57 million drivers and had been stolen back in 2016. The company then made matters worse by not reporting the breach to international data regulators, and instead paid the perpetrators $100,000 to delete the sensitive files and cover up the incident.   However, Uber’s failure to disclose the breach goes beyond non-adherence to best practice and journeys into the realm of the unethical. With such a large amount of sensitive data at stake, Uber was certainly ...

Check Point Security Credentials Validated with Cyber Essentials Plus Awards

 
Check Point is proud to announce that we have received two ‘Cyber Essentials Plus’ awards under the British Government’s Cyber Essentials Accreditation Scheme. The British Ambassador to Israel, David Quarrey, officially presented the accreditations as part of the UK Government’s Cyber Essentials Scheme. Launched in 2014, the Cyber Essentials Scheme serves as part of the National Cyber Security Strategy to help British organizations bolster their defenses against cyber-attack.   Meeting the Criteria The Cyber Essentials Plus accreditation offers a higher level of assurance by externally testing an organisation’s cyber security approach. The assessment was conducted ...

HomeHack: How Hackers Could Have Taken Control of LG’s IoT Home Appliances

 
The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent shivers down the cybersecurity world’s spine. In uncomfortably realistic detail, hackers virtually broke into a smart home, turning the home-based IoT technology against its inhabitants. The TV and stereo started switching on and off randomly, the water temperature in the shower went from boiling to freezing with little warning, and the air conditioning brutally forced the characters to leave their homes by reaching arctic temperatures. The most unsettling part of the whole sequence isn’t that this type of cyberattack might happen. It’s unsettling because it’s already happening. Recently, ...