Research April 20, 2017 Check Point Infinity – The Security Architecture of the Future – Today Infinity is boundless. Unfortunately so are your IT demands and security expectations. The explosion of ...
Research April 13, 2017 March’s ‘Most Wanted’ Malware List: Exploit Kits Rise Again in Popularity Old malware rarely dies: it just lies dormant for a while. This was one of ...
Harmony April 6, 2017 The latest findings on Chrysaor (Pegasus for Android) are even more stealthy Earlier this week Google published a research about a new sophisticated spyware tool for Android, ...
Research March 23, 2017 Google’s annual Android security report illustrates Check Point’s dominance in mobile threat defense research Google published its annual security report yesterday for the Android ecosystem. The report includes many ...
Research March 22, 2017 Ransomware– Not Only File Encryption Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no ...
Research March 15, 2017 Check Point Discloses Vulnerability that Potentially Allows Hackers to Take over Hundreds of Millions of WhatsApp & Telegram Accounts One of the most concerning revelations arising from the recent WikiLeaks publication is the possibility ...
Research March 14, 2017 Merry X-Mas Ransomware Decryption Tool Merry X-Mas is a ransomware that was first spotted in the wild on January 3, ...
Research March 13, 2017 Hancitor Makes First Appearance in Top Five ‘Most Wanted’ Malware in Check Point’s February Global Threat Impact Index Hancitor has surged into the top five of our ‘most wanted’ malware families worldwide for ...
Research March 10, 2017 Three Key Takeaways from WikiLeaks’ Release of CIA Documents The latest revelations by WikiLeaks, collectively called the “Vault 7 Leak”, have caused quite a ...
Research March 10, 2017 Preinstalled Malware Targeting Mobile Users Check Point mobile threat researchers recently detected a severe infection in 36 Android devices belonging to ...