Harmony February 8, 2018 SandBlast Mobile delivers new Orange Mobile Threat Protection service Mobile devices are critical to every organization’s digital transformation initiative. But for hackers set on ...
Innovation November 13, 2017 October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form ...
Research September 12, 2017 BlueBorne: A New Set of Bluetooth Vulnerabilities Endangering Every Connected Device The IoT cybersecurity firm, Armis, has revealed eight vulnerabilities in the implementation of Bluetooth in ...
Harmony May 25, 2017 The Judy Malware: Possibly the largest malware campaign found on Google Play Check Point researchers discovered another widespread malware campaign on Google Play, Google’s official app store. ...
Research May 16, 2017 The mobile banker threat – from end to end One of the most dangerous threats targeting mobile users is the banking malware. These malicious ...
Research May 9, 2017 Android Permission Security Flaw Check Point researchers spotted a flaw in one of Android’s security mechanisms. Based on Google’s ...
Research April 20, 2017 Check Point Infinity – The Security Architecture of the Future – Today Infinity is boundless. Unfortunately so are your IT demands and security expectations. The explosion of ...
Harmony April 6, 2017 The latest findings on Chrysaor (Pegasus for Android) are even more stealthy Earlier this week Google published a research about a new sophisticated spyware tool for Android, ...
Research March 23, 2017 Google’s annual Android security report illustrates Check Point’s dominance in mobile threat defense research Google published its annual security report yesterday for the Android ecosystem. The report includes many ...
Research March 10, 2017 Three Key Takeaways from WikiLeaks’ Release of CIA Documents The latest revelations by WikiLeaks, collectively called the “Vault 7 Leak”, have caused quite a ...