Check Point Blog

Threat Research November 20, 2014

New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition

If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the…

Read More
Threat Research November 12, 2014

When it Comes to Security, What is Good Enough?

Ben Franklin once said that an ounce of prevention is better than a pound of cure. We couldn’t agree more when it comes to network security. From both time and financial standpoints, it is much…

Read More
Threat Research November 10, 2014

Immobilize WireLurker Before It Immobilizes You

A recent malware, “WireLurker”, affects Apple OS X and iOS. As highlighted in the recent announcement by Check Point on mobile security, the amount of mobile malware is on the rise. In this case, WireLurker…

Read More
Threat Research November 3, 2014

At the heart of Zero Day are 1440 minutes. What can happen in one minute?

At Check Point, we live in the same business world everyone else does, where we have to operate at the speed of our customers. In our case, though, one mistake impacts a lot more than…

Read More
Threat Research September 21, 2014

Mobile Security Weekly – A Whole New iWorld

This edition of the Mobile Security Weekly couldn’t start with anything but the release of the iPhone 6 and 6 Plus. With it, all the old discussions of Android vs iPhone have risen again, along…

Read More
Threat Research August 12, 2013

Security flaw in LG devices allows malware to root a device

A new vulnerability exploiting LG Android devices was published just yesterday at the XDA conference in Florida, Miami.  The vulnerability exists on various LG devices, including the flagship LG Optimus G, on a number of Android…

Read More
Threat Research November 15, 2012

MythBusters – is iOS Hack-Proof?

At Lacoon Security we sleep, breathe and live mobile security. But one question we keep receiving is whether iPhones are in fact hack-proof. After all, when you hear about malicious apps – such as those…

Read More