Research April 8, 2016 Qihoo 360: Just the Tip of the Whitelisted Malware Iceberg The Check Point Mobile Threat Prevention team has long stressed how dangerous it can be ...
Research April 6, 2016 Ransomware: Cybercriminals New Attack of Choice In recent years, we’ve seen banker malware as the most prominent threat in the cyber ...
Research April 6, 2016 Congrats! More than 7000 applications in your database Security managers will appreciate Check Point’s Application Control Software Blade. With more than 7000 pre-defined ...
Research April 5, 2016 New Technology Strives to Keep Android Apps and Users Safe Mobile applications are intended to be safe for use, protecting users’ privacy. However, many of ...
Research April 4, 2016 New Locky Ransomware Variant Implementing Changes in Communication Patterns Recently, Check Point published a detailed report describing Locky, an emerging new ransomware threat, which ...
Research April 4, 2016 It’s Time to ReThink Security Management “You never change things by fighting the existing reality. To change something, build a new ...
Research April 1, 2016 Angler EK Malvertising via Hacked Revive Adserver Malware are spread by various methods such as phishing emails, malicious URLs, and more. One ...
Research April 1, 2016 Check Point Threat Alert: Ransomware Campaigns Using .JS Inside Archives Recently there is noticeable increase in using JavaScript files inside archives as a means to ...
Research March 31, 2016 SideStepper: Bypassing the iOS Gatekeeper to Attack iPhone and iPad Devices Check Point disclosed details about SideStepper, a vulnerability that can be used to install malicious ...
Research March 29, 2016 Unsecure Routers Pose a Serious Risk to Small Businesses Today, business cannot operate without an internet connection. Business leaders are more empowered than ever ...