Check Point Blog

Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation

Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible to existing antivirus defenses. These techniques, known as “crypting,” enable malware writers to create unknown variants of proven, highly effective malware that evade AV detection and extend the reach of existing bot infrastructure. Check Point Threat Emulation recently demonstrated that…

Read More
Threat Research January 30, 2013

Malware Evolution: PC-based vs. Mobile

Read More
Threat Research January 2, 2013

Spyphones as a Political Espionage Tool

Read More
Threat Research November 21, 2012

MythBusters – is iOS Hack-Proof?

Read More
Threat Research November 15, 2012