Names have been changed to protect the privacy of the individuals involved. On the morning of February 26, 2015, Laurie logged on to her Google account at work and discovered that overnight, someone had…
Read MoreHillary Clinton has been scrutinized for using her private email account for Department of State-related correspondence. The so-called “email-gate” has put Mrs. Clinton in a hot-spot forcing her to provide explanations to what appears to…
Read MoreCheck Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of a crucial component in the Windows operating system, and demonstrated the use of such an attack by revealing a previously…
Read MoreWe have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack…
Read MoreIf you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the…
Read MoreSummary Check Point’s Threat Emulation Cloud Service recently detected an Excel document that runs a macro in order to change the computer’s background “as a joke”. Like other email chain letters, the message propagates when…
Read MoreSummary Check Point’s Malware Research Group has been investigating the ‘Cryptolocker’ malware that has recently been reported to be on the rise. As part of the analysis, the researchers created a ‘sinkhole’ – a system…
Read MoreSummary On October 24, 2013, the Check Point ThreatCloud Emulation Service received six PDF document files from a European Union official agency running a Check Point threat prevention gateway. Automated analysis in the Threat Emulation…
Read More