Check Point Blog

Threat Research January 30, 2013

Tales from the Crypter: Thwarting Malware Obfuscation with Threat Emulation

Summary Malware writers employ a variety of specialized obfuscation techniques to render known malware invisible to existing antivirus defenses. These techniques, known as “crypting,” enable malware writers to create unknown variants of proven, highly effective…

Read More
Threat Research January 2, 2013

Malware Evolution: PC-based vs. Mobile

Read More
Threat Research November 21, 2012

Spyphones as a Political Espionage Tool

Read More
Threat Research November 15, 2012

MythBusters – is iOS Hack-Proof?

Read More