Research August 31, 2015 Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices Introduction Ransomware has been a well-known method of attack in the PC world for quite ...
Research August 27, 2015 Leadership, Validation, Innovation and Continuous Improvement From 1,300 known viruses in 1997 to over 100,000 new malware variants created each day ...
Research August 25, 2015 Certifi-gate Found in the Wild on Google Play New Insights on the Extent, Exploitation, and Mitigation of This New Threat Three weeks ago, ...
Research August 18, 2015 JavaScript Hooking as a Malicious Website Research Tool One of the top Internet threats today is drive-by download attacks which originate from exploits ...
Research August 17, 2015 What You Can (and Can’t) Do Against Ransomware It happens very quickly: one moment your files are there, and the next they’re not. ...
Research August 12, 2015 SSH Decryption Opens Door to Very Old Security Vectors Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions ...
Research August 11, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part II – Supremacy In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research August 4, 2015 Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part I In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...
Research July 16, 2015 Some Lessons from the Hacking Team Breach Reactions to the breach at Hacking Team, as described in Steve Ragan’s recent blog post, ...