Research August 24, 2016 The QuadRooter Domino Effect Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities ...
Research August 24, 2016 The Evolution of Proxy When I entered the security market nearly 20 years ago, the philosophical and almost religious ...
Research August 23, 2016 Phishing scams target everyone – even us! Phishing scams have been around for over twenty years. It appears unlikely that they will ...
Research August 22, 2016 Check Point Forensic Files: Proving Ranscam ransomware does not provide a way to recover files Every week we see new ransomware variants as cyber criminals continue to generate revenue from ...
Research August 18, 2016 July’s Top 10 Most Wanted Malware Check Point Software Technologies today revealed the number of active malware families decreased by 5 ...
Research August 16, 2016 CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business ...
Research August 7, 2016 QuadRooter: New Android Vulnerabilities in Over 900 Million Devices Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android ...
Research August 2, 2016 SandBlast Receives ‘Recommended’ Rating Once Again Hackers continue to target organizations with advanced malware. With over 390,000 new malware variants created ...
Research July 26, 2016 Ransomware: what you need to know In recent years, there has been a surge of ransomware attacks. It’s been reported all ...
Research July 21, 2016 The Cure for Your Private Cloud Security Blues Hot off the heels of Cisco Live! in Las Vegas, there’s a continued buzz about ...