Check Point Blog

LinkedIn Intro – A FAQ

There’s a lot of buzz regarding LinkedIn’s new iOS app – Intro. Some are hailing it, others hate it. To clarify what’s going on, we’ve put together this FAQ.

Read More
Threat Research October 25, 2013

Lacoon">

Lacoon">Viewpoints on Launching Lacoon

Read More
Threat Research October 15, 2013

Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation

Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible to existing antivirus defenses. These techniques, known as “crypting,” enable malware writers to create unknown variants of proven, highly effective malware that evade AV detection and extend the reach of existing bot infrastructure. Check Point Threat Emulation recently demonstrated that…

Read More
Threat Research January 30, 2013