Check Point Blog

Threat Research December 3, 2014

Let’s Be Fair and Test Technology the Same Way We Use It.

More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once…

Read More
Threat Research December 1, 2014

Man in the Binder: He Who Controls the IPC Controls the Droid

At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the…

Read More
Threat Research November 25, 2014

Has Your Android Device Been Fakedebuggered?

Read More
Threat Research November 20, 2014

New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition

If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the…

Read More