Check Point Blog

Threat Research December 10, 2013

The 2013 Android Vulnerability of the Year

Were we to pick the most notorious 2013 Android vulnerability - the dubious award would undoubtedly go to CVE-2013-6282. A privilege escalation flaw released in October and affects all Android versions 4.0-4.3. What makes this vulnerability so abysmal?

Read More
Threat Research November 26, 2013

Check Point Threat Emulation Finds “Joke-of-the-day” Chain Letter is No Joke

Summary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a macro in order to change the computer’s background “as a joke”. Like other email chain letters, the message propagates when…

Read More
Threat Research November 14, 2013

Defeating Cryptolocker with ThreatCloud and Gateway Threat Prevention

Summary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…

Read More
Threat Research November 1, 2013

Threat Emulation Exposes Widespread Malware Campaign

Summary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…

Read More
Threat Research October 25, 2013

LinkedIn Intro – A FAQ

There’s a lot of buzz regarding LinkedIn’s new iOS app – Intro. Some are hailing it, others hate it. To clarify what’s going on, we’ve put together this FAQ.

Read More
Lacoon">
Threat Research October 15, 2013

Lacoon">Viewpoints on Launching Lacoon

Read More