March 26, 2015 Intelligence Report: Equation Group Executive Summary The Equation Group, active since 2001, is a highly advanced and secretive computer ...
March 24, 2015 CuckooDroid – Fighting the Tide of Android Malware The future is mobile. Few experts doubt this conclusion these days. The accelerating proliferation of ...
Security March 19, 2015 Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of ...
January 16, 2015 Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly This week’s edition focuses on one main story that is rapidly turning into a bit ...
December 31, 2014 Mobile Security 2014: The Year In Review It was an eventful year for mobile security, and as 2014 draws to a close, ...
December 22, 2014 What Does Fast Threat Emulation Mean? Your IT department has probably deployed multiple kinds of defenses to protect your network from ...
December 10, 2014 Aren’t All Security Threat Emulations the Same? You should be picky when selecting a security solution for your network. When it comes ...
December 3, 2014 Let’s Be Fair and Test Technology the Same Way We Use It. More than 2.1 million emails are sent and received every second. With high-speed internet as ...
December 1, 2014 Man in the Binder: He Who Controls the IPC Controls the Droid At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new ...
November 25, 2014 Has Your Android Device Been Fakedebuggered? Information about a new vulnerability used to gain device root access to install files on ...