Research July 18, 2016 Top 10 Most Wanted Malware Check Point Software Technologies today published its latest Threat Index, revealing the number of active ...
Research July 11, 2016 Malware’s Constant Evolution Requires Advanced Protections Malware developers are fast learners. They adapt to new security measures in record time and ...
Research July 8, 2016 Jigsaw Ransomware Decryption The Jigsaw ransomware was first spotted in April 2016, and has since received a ...
Research June 21, 2016 Top 10 Most Wanted Malware Today Check Point published its Threat Index for May, revealing the number of active global ...
Research June 17, 2016 In The Wild: Mobile Malware Implements New Features Malware developers just won’t stand still. They continue developing malware as they go, sometimes to ...
Research June 3, 2016 In The Wild: Never a Dull Moment with Mobile Malware Mobile malware learns fast. Every time new security measures come along, malware somehow manages to ...
Research June 1, 2016 Hack In The Box: Mobile Malware Goes In For The Kill For attackers, installing a Trojan on your mobile device is the best way to attack ...
Security May 29, 2016 OEMs Have Flaws Too: Exposing Two New LG Vulnerabilities Check Point disclosed today two vulnerabilities (CVE-2016-3117, CVE-2016-2035) which can be used to elevate privileges ...
Research May 27, 2016 Attacks on SMB are a sure thing, according to the latest Verizon report It’s not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. ...
Research May 25, 2016 Hack In The Box: Malware Disguises Itself To Infiltrate Your Device No user would intentionally allow malware onto a mobile device, so it’s obvious why malicious ...