Research February 1, 2016 JSPatch Vulnerability Digs Under Apple’s Garden Walls One of the reasons iPhones are considered more secure is the thorough vetting each and ...
Research January 26, 2016 A Major Step Ahead in Network Security It’s January 2016 and my New Years’ resolution is still fresh in my mind. In ...
Research January 19, 2016 Something is Cooking in Brazil Looking at the global cyber landscape, we can see many campaigns and persistent threats occurring ...
Research January 18, 2016 Ukraine Power Outage Demonstrates Infrastructure Vulnerability The night before Christmas Eve, the Ivano-Frankivsk region in western Ukraine, an area the size ...
Research January 15, 2016 Check Point Threat Alert: Cryptowall 4 Executive Summary Ransomware is a type of malware that restricts access to an infected computer ...
Research January 14, 2016 Check Point Threat Alert: BlackEnergy Trojan Executive Summary BlackEnergy malware has been around since 2007, first appearing as a simple DDoS ...
Research January 8, 2016 Turkish Clicker: Check Point Finds New Malware on Google Play The Check Point research team has discovered an extensive malware campaign on the Google Play™ ...
Research January 7, 2016 You’re watching TV – Is it also watching you? The Internet of Things (IoT) revolves around machine-to-machine communication, and it’s growing exponentially. Sure, it ...
Research January 4, 2016 CHECK POINT THREAT ALERT: SHODAN EXECUTIVE SUMMARY Shodan (https://www.shodan.io/) is a search engine that uses a variety of filters to ...
Research December 30, 2015 In The Wild: Mobile Cybercrime Goes Big in 2015 Cybercriminals made significant advances in the sophistication and number of attacks on mobile devices in ...