Research October 31, 2017 Account Hijacks Affect Everybody, Even ‘Top Dogs’ Being “cool and smart” was the name of the game when we were at school, ...
Security October 18, 2017 Boleto: The Perfect ‘Inside Job’ Banking Malware The Brazilian cyberspace is known to be a whole ecosystem of its own and, although ...
Security October 17, 2017 Baby, Who Can Drive My Car? This is the third post in our IoT blog series. Read the first post about ...
Research October 12, 2017 September’s Most Wanted Malware: Locky Shoots Back Up Global Rankings Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks ...
Harmony September 18, 2017 Does Your Mobile Anti-Virus App Protect Or Infect You? The Truth Behind DU Antivirus Security With mobile attacks representing nearly 20% of all cyberattacks in the Americas during the first ...
Harmony September 14, 2017 ExpensiveWall: A Dangerous ‘Packed’ Malware On Google Play That Will Hit Your Wallet Check Point’s mobile threat research team identified a new variant of an Android malware that ...
Research September 11, 2017 Beware of the Bashware: A New Method for Any Malware to Bypass Security Solutions With a growing number of cyber-attacks and the frequent news headlines on database breaches, spyware ...
Security August 21, 2017 July’s Most Wanted Malware: RoughTed and Fireball Decrease, But Stay Most Prevalent Check Point’s latest Global Threat Impact Index reveals that that the number of organizations impacted ...
Research August 18, 2017 Is Malware Hiding in Your Resume? Vulnerability in LinkedIn Messenger Would Have Allowed Malicious File Transfer The popular business social network LinkedIn has accumulated over 500 million members across 200 countries ...
Research August 15, 2017 Get Rich or Die Trying: A Case Study on the Real Identity behind a Wave of Cyber Attacks on Energy, Mining and Infrastructure Companies Over the past 4 months, over 4,000 organizations globally have been targeted by ...