Research April 3, 2017 2017-4-3 Global Cyber Attack Report TOP ATTACKS AND BREACHES America’s Job Link Alliance (AJLA), a job portal of the US ...
Research April 3, 2017 Stopping Your Staff from Raining Data from the Cloud No matter what your company’s official position is on the use of cloud services, your ...
Research March 27, 2017 Best-of-breed security for hybrid clouds Wouldn’t it be great if you could make a fresh start with your organization’s IT ...
Research March 23, 2017 Google’s annual Android security report illustrates Check Point’s dominance in mobile threat defense research Google published its annual security report yesterday for the Android ecosystem. The report includes many ...
Research March 22, 2017 Ransomware– Not Only File Encryption Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no ...
Research March 21, 2017 Swearing Trojan Continues to Rage, Even After Authors’ Arrest Researchers with Tencent Security recently disclosed details about Swearing Trojan, a mobile banking malware that ...
Research March 20, 2017 Get off my (private) cloud As enterprises transform their physical data centers to private and hybrid cloud models, how should ...
Research March 15, 2017 Check Point Discloses Vulnerability that Potentially Allows Hackers to Take over Hundreds of Millions of WhatsApp & Telegram Accounts One of the most concerning revelations arising from the recent WikiLeaks publication is the possibility ...
Research March 14, 2017 Merry X-Mas Ransomware Decryption Tool Merry X-Mas is a ransomware that was first spotted in the wild on January 3, ...
Research March 13, 2017 Hancitor Makes First Appearance in Top Five ‘Most Wanted’ Malware in Check Point’s February Global Threat Impact Index Hancitor has surged into the top five of our ‘most wanted’ malware families worldwide for ...