Research September 7, 2016 Email from PayPal? Don’t Get Attached! Introduction Phishing scams are fraudulent email messages that appear to come from legitimate enterprises such ...
Research September 7, 2016 Closing the Cloud Security Gaps Regardless of where your applications and data reside – whether in private, public or hybrid ...
Research September 1, 2016 Check Point Forensics: PokemonGo Ransomware’s Hidden Unexpected User It was inevitable. Given the popularity of PokemonGo, ransomware developers have already attempted to trick ...
Research August 31, 2016 DressCode Android Malware Discovered on Google Play The Check Point mobile threat prevention research team discovered a new Android malware on Google ...
Research August 31, 2016 Check Point Spearheads Threat Prevention Security for Small and Medium Businesses Small and medium-sized business owners typically think the security that protects their large enterprises counterparts ...
Research August 30, 2016 Whaling: The Hunt for High Profile Business Targets What are whaling attacks? “Whaling” attacks, also called Business Email Compromise (BEC), are a newer ...
Research August 29, 2016 Beware of the Trident Exploits Researchers from The Citizen Lab at the University of Toronto last week revealed a sophisticated ...
Research August 26, 2016 Web Scripting Language PHP-7 Vulnerable to Remote Exploits Exploiting server side bugs is a jackpot for hackers. Users tend to keep their data ...
Research August 25, 2016 Advancing the Security of Your SDDC VMworld US is rapidly approaching and we’ve been busy gearing up for a great show! ...
Research August 24, 2016 The QuadRooter Domino Effect Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities ...