2017 was an incredible year for the cyber security industry. With attacks reaching ever higher numbers and increasing levels of innovation, there seems to be no stop to the cat and mouse game taking place…
Read MoreArnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we’re ready for it.” The past year certainly took us by surprise when the WannaCry and Petya ransomware…
Read MoreSanta’s beard is usually white, the colour of purity and innocence. However, cyber-criminals targeting online shoppers enjoying the run up to the Black Friday and Christmas holidays this year could be trying to take advantage…
Read MoreCheck Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet…
Read MoreThe smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as…
Read MoreBeing “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the…
Read MoreThis is the third post in our IoT blog series. Read the first post about IoT in healthcare and the second post about smart cities here. Driverless cars have long been a feature in science fiction –…
Read MoreThe second in our Check Point IoT series, read our first post about securing IoT devices in healthcare here. The smart city is sparking the imagination of planners, developers, governments, businesses and citizens all over…
Read MoreThis week, our founder and CEO Gil Shwed participated in a fascinating Q&A session on Quora. He answered the Quora community’s top questions on cyber security, mobile security and innovation. Here are our editor’s pick…
Read More2017 has proved to be a lucrative year for cybercrime. Prominent malware and attack methods continue to evolve, creatively bypassing existing security solutions. In 2016, we witnessed sophisticated new malware emerging on a regular basis,…
Read More