Research August 31, 2015 Global XMPP Android Ransomware Campaign Hits Tens of Thousands of Devices Introduction Ransomware has been a well-known method of attack in the PC world for quite ...
Research August 27, 2015 Leadership, Validation, Innovation and Continuous Improvement From 1,300 known viruses in 1997 to over 100,000 new malware variants created each day ...
Research August 25, 2015 Certifi-gate Found in the Wild on Google Play New Insights on the Extent, Exploitation, and Mitigation of This New Threat Three weeks ago, ...
Research July 21, 2015 One Click Office Exploit – Introducing the Office Exploit Builder A new threat called “office exploit builder” allows attackers to generate stealth MS Office files ...
Research July 16, 2015 Some Lessons from the Hacking Team Breach Reactions to the breach at Hacking Team, as described in Steve Ragan’s recent blog post, ...
Research July 9, 2015 Check Point Threat Alert: Hacking Team EXECUTIVE SUMMARY Hacking Team is an Italian company that provides security services and tools ...
Research July 6, 2015 Crime Marches On What a long way we’ve come since the days of simply relying on firewalls. Just ...
Research June 16, 2015 Check Point 2015 Security Report Paints a Picture of the Threat Landscape—And it’s Not Pretty This month, Check Point released its annual security report—a trove of statistics and trends culled ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
April 29, 2015 Threat Alert: WordPress Cross-Site Scripting Overview The WordPress content management system used by millions of websites is vulnerable to ...