Research September 14, 2015 The Problem with Traditional Sandboxing Hackers have come to recognize and understand the usual methods of threat prevention, like antivirus, ...
Research September 8, 2015 WhatsApp “MaliciousCard” Vulnerabilities Allowed Attackers to Compromise Hundreds of Millions of WhatsApp Users Introduction WhatsApp Web is a web-based extension of the WhatsApp application on your phone. The ...
Research September 2, 2015 Introducing Check Point SandBlast Zero-Day Protection Cyber threats are continuing to evolve, and hackers are finding new ways to hide malware ...
Research August 27, 2015 Leadership, Validation, Innovation and Continuous Improvement From 1,300 known viruses in 1997 to over 100,000 new malware variants created each day ...
Research August 18, 2015 JavaScript Hooking as a Malicious Website Research Tool One of the top Internet threats today is drive-by download attacks which originate from exploits ...
Research August 17, 2015 What You Can (and Can’t) Do Against Ransomware It happens very quickly: one moment your files are there, and the next they’re not. ...
Research July 13, 2015 Threat Alert: OPM Tools EXECUTIVE SUMMARY -The breach in the U.S. Office of Personnel Management (OPM) had compromised the ...
Research July 7, 2015 Who Really Controls Your Online Store? Check Point researchers Avi Gimpel, Liad Mizrachi and Oded Vanunu recently discovered critical vulnerabilities in ...
Research June 18, 2015 Stopping the Next Massive Cyberattack – Step 4: Monitor With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires ...
Research June 10, 2015 Critical Infrastructure is at Risk! Almost all of today’s modern conveniences, such as electricity, transportation, water systems, and manufactured products, ...