Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2015-04-16 17:19:38 |
Protecting Beyond the Point of Sale (lien direct) |
The sad reality is that retail breaches are becoming too common. With over a billion credit cards in circulation in the US and over 7 billion worldwide, credit card data has become a prime target for cybercriminals. An alarming number of data and network security breaches happen each year in the payment card and retail […]
|
|
|
|
|
2015-04-15 14:20:57 |
Check Point Threat Alert: AAEH/Beebone (lien direct) |
Overview AAEH, also known as BeeBone, is a family of polymorphic downloaders created with the primary purpose of downloading other malware, including password stealers, rootkits, fake antivirus, and ransomware. AAEH is often propagated across networks, removable drives (USB/CD/DVD), and through ZIP and RAR archive files. Other aliases include VObfus, VBObfus, and Changeup. The polymorphic […]
|
|
|
|
|
2015-04-10 15:01:34 |
(Déjà vu) Mobile Security Market Grows, iOS Patched (AGAIN!), Encryption Has Hole – Mobile Security Weekly (lien direct) |
The post Mobile Security Market Grows, iOS Patched (AGAIN!), Encryption Has Hole – Mobile Security Weekly |
|
|
|
|
2015-04-08 14:08:21 |
The Curious Incident of the Phish in the Night-Time: a Forensic Case Study (lien direct) |
Names have been changed to protect the privacy of the individuals involved. On the morning of February 26, 2015, Laurie logged on to her Google account at work and discovered that overnight, someone had used her account as a stepping stone for a total, indiscriminate phishing campaign. Laurie is the chief administrative assistant […]
|
|
|
★★★★
|
|
2015-04-01 17:54:33 |
Segmentation is Great in Theory, but Who Has the Time? (lien direct) |
Security is one of those, “pay a little now, or pay a lot later†concepts. Your data, your customer information, your intellectual property, your trade secrets, these are the lifeblood of your company. One bad hack could distract your team for months, set your product position back years or worse, put you out of business […]
|
|
|
★★★★
|
|
2015-03-31 13:59:29 |
Volatile Cedar – Analysis of a Global Cyber Espionage Campaign (lien direct) |
Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in Lebanon with political ties. Beginning in late 2012, the carefully orchestrated attack campaign we call Volatile Cedar has been targeting individuals, companies and institutions worldwide. This campaign, led by a persistent attacker group, has successfully penetrated a large number of […]
|
|
|
★★★★★
|
|
2015-03-27 16:20:14 |
What Can We Learn from Clinton\'s “Email-gate� (lien direct) |
Hillary Clinton has been scrutinized for using her private email account for Department of State-related correspondence. The so-called “email-gate†has put Mrs. Clinton in a hot-spot forcing her to provide explanations to what appears to be not only an attempt to hide official correspondence from the public but, more importantly, a breach in security. […]
|
|
|
★★★★
|
|
2015-03-27 15:15:13 |
(Déjà vu) Half of Androids Vulnerable, Half of App Makers Eschew Security, iOS Jailbreak Coming – Mobile Security Weekly (lien direct) |
The post Half of Androids Vulnerable, Half of App Makers Eschew Security, iOS Jailbreak Coming – Mobile Security Weekly |
|
|
★★★
|
|
2015-03-26 18:08:10 |
Intelligence Report: Equation Group (lien direct) |
Executive Summary The Equation Group, active since 2001, is a highly advanced and secretive computer espionage organization. The first report on Equation was published by Kaspersky during their 2015 Security Analyst Summit. The malware used in their operations, dubbed EquationDrug and GrayFish, is capable of reprogramming hard disk drive firmware. The group is using advanced techniques, predilection […]
|
|
|
★★★★★
|
|
2015-03-24 20:08:40 |
CuckooDroid – Fighting the Tide of Android Malware (lien direct) |
The future is mobile. Few experts doubt this conclusion these days. The accelerating proliferation of smartphones and other devices powered by the Android operating system throughout the world has created a corresponding increase in mobile apps – especially malicious mobile apps. This relatively new, but rapidly evolving, type of malware poses previously unseen dangers. […]
|
|
|
★★★★★
|
|
2015-03-23 16:30:06 |
Go Atomic or Go Home (lien direct) |
Have you never heard the term 'Atomic Segment' used in security? Me neither. That is, until I came to Check Point. If you think about it, it makes a lot of sense. An atomic segment is a set of computing and networking elements that: (1) share a common security profile; (2) cannot further be subdivided […]
|
|
|
★★★★
|
|
2015-03-20 16:46:56 |
(Déjà vu) FREAK Lives On, Play Has Adware, iOS Brute-Force Attack – Mobile Security Weekly (lien direct) |
The post FREAK Lives On, Play Has Adware, iOS Brute-Force Attack – Mobile Security Weekly |
|
|
★★★★
|
|
2015-03-19 17:23:12 |
Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus (lien direct) |
Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of a crucial component in the Windows operating system, and demonstrated the use of such an attack by revealing a previously unknown vulnerability in Bitdefender Anti-Virus. The operating system component, known as NDIS, serves as the connecting layer between the […]
|
|
|
|
|
2015-03-13 14:49:17 |
Shiver Me Timbers! DDoS Attacks Caused by Pirate Bay Trackers and DNS Misconfigurations? (lien direct) |
In January of 2015 the Check Point Incident Response team (CPIR) had two DDoS attack cases from separate customers with similar characteristics: The first case: On Saturday January 10th a US Children's Hospital called the CPIR Emergency Hotline because they were suffering a DDoS attack.. After quick examination, the attack traffic was found to have […]
|
|
|
★★★★★
|
|
2015-03-12 20:28:54 |
Segmentation – the Simplest Security Policy Most People Miss (lien direct) |
In our 2014 Security Report, we highlighted a quote from Bill Cheswick, a world-renowned computer security expert, who in 1990 talked about first-generation network security focusing on perimeter protection. He called this simple perimeter security concept 'a sort of crunchy shell around a soft, chewy center.' The idea used to be that an organization's internal […]
|
|
|
★★★★★
|
|
2015-03-06 15:51:43 |
(Déjà vu) FREAK (Out!) Attack, Fake Amazon Voucher, Google Doesn\'t Encrypt – Mobile Security Weekly (lien direct) |
The post FREAK (Out!) Attack, Fake Amazon Voucher, Google Doesn’t Encrypt – Mobile Security Weekly |
|
|
★★
|
|
2015-02-27 15:54:37 |
(Déjà vu) iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly (lien direct) |
The post iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly |
|
|
★★
|
|
2015-02-24 15:06:20 |
Is Software Defined Protection the New Software Defined Networking? (lien direct) |
Software Defined Networking (SDN) is the latest buzz term to take over the networking world – and is not to be overlooked. With the goal of automating network infrastructure functions that used to be fixed or manual, the aim is to take complex configuration tasks and make them programmable. When implemented correctly, it should make […]
|
|
|
|
|
2015-02-20 22:24:23 |
Angler Exploit Kit – Blocking Attacks Even Before Zero Day (lien direct) |
The Story Blocking attempts to use exploit kits (EK) against our customers is one of Check Point’s main targets in IPS. Thus, our Intelligence Teams follow closely the trends in this world. On late December, we noticed hype around a specific EK, namely, Angler EK, and decided to give high priority to writing an IPS […]
|
|
|
|
|
2015-02-19 22:22:22 |
Malware Analysis 101 (lien direct) |
Introduction A common misconception about malware is the great difficulty of performing malware analysis and the technical requirements involved. When many technical users are faced with a malware infection and asked to analyze it, they may think, “Hey, I’ve heard about this kind of malware. I’ve even read some malware reports, and they sound really […]
|
|
|
|
|
2015-02-19 20:45:14 |
Malware Analysis – CTB-Locker (lien direct) |
Executive Summary CTB (Curve-Tor-Bitcoin) Locker is a crypto-ransomware variant. It is based on advanced algorithms which are used in different combinations, making CTB-Locker significantly more difficult to detect and neutralize. CTB-Locker (aka Critroni or Onion) is based on a so-called encryptor, which encrypts all of a user's personal data and extorts payment to decrypt the […]
|
|
|
|
|
2015-02-19 12:51:46 |
Targeted Attacks on Enterprise Mobile Exposed in New Threat Research (lien direct) |
The post Targeted Attacks on Enterprise Mobile Exposed in New Threat Research |
|
|
|
|
2015-02-13 16:42:30 |
(Déjà vu) New Android Trojans, Gremlins Inside Play, iPhone\'s Safe and Sound – Mobile Security Weekly (lien direct) |
The post New Android Trojans, Gremlins Inside Play, iPhone's Safe and Sound – Mobile Security Weekly |
|
|
★★
|
|
2015-02-10 16:20:39 |
Demystifying iOS Enterprise Certificates (lien direct) |
The post Demystifying iOS Enterprise Certificates |
|
|
★★★★★
|
|
2015-02-06 17:37:08 |
(Déjà vu) iOS Attacked (Again), Play\'s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly (lien direct) |
The post iOS Attacked (Again), Play’s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-02-06 17:31:26 |
Your Malware Would Like To Phone a Friend (lien direct) |
The post Your Malware Would Like To Phone a Friend |
|
|
★★★
|
|
2015-02-05 17:30:43 |
Clever and Persistent Android Banking Trojan Discovered (lien direct) |
The post Clever and Persistent Android Banking Trojan Discovered |
|
|
★★★★★
|
|
2015-02-03 21:02:35 |
Cyberthieves Can Score a Data Touchdown with Unencrypted Apps (lien direct) |
The post Cyberthieves Can Score a Data Touchdown with Unencrypted Apps |
|
|
★★★
|
|
2015-01-30 15:55:55 |
(Déjà vu) Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly (lien direct) |
The post Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-01-26 20:52:08 |
Threat Advisory – CVE-2014-7911: A New Root Exploit for Android (lien direct) |
The post Threat Advisory – CVE-2014-7911: A New Root Exploit for Android |
|
|
★★
|
|
2015-01-23 16:49:54 |
(Déjà vu) Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly (lien direct) |
The post Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly |
|
|
★★
|
|
2015-01-20 18:58:29 |
Presto Change-o, Pixel Battery Saver Transforms into Potential Malware (lien direct) |
The post Presto Change-o, Pixel Battery Saver Transforms into Potential Malware |
|
|
★★★★★
|
|
2015-01-16 15:05:13 |
(Déjà vu) Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly (lien direct) |
The post Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-01-09 15:05:24 |
(Déjà vu) Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly (lien direct) |
The post Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly |
|
|
★★★★★
|
|
2015-01-09 01:25:54 |
Diving into a Silverlight Exploit and Shellcode – Analysis and Techniques (lien direct) |
In recent years, exploit-kits have become one of the most common platforms for malware distribution. One of the exploits coming from Infinity exploit-kit exploits a security vulnerability in Microsoft Silverlight. Compared to other technologies like Java, PDF, Flash, etc. – Silverlight exploits are less common. Just to get a rough feeling, according to cvedetails.com, from […]
|
|
|
|
|
2014-12-31 16:47:54 |
Mobile Security 2014: The Year In Review (lien direct) |
The post Mobile Security 2014: The Year In Review |
|
|
|
|
2014-12-27 03:42:17 |
Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping (lien direct) |
The post Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping |
|
|
|
|
2014-12-23 11:14:53 |
Your Website Should Reflect Your Brand – Not an Attacker\'s (lien direct) |
When IT professionals and business owners think about their security strategies, they often forget about one of the easiest assets for cyber criminals to attack: their websites. From consumer brands to small businesses to large enterprise companies, a website is the front-facing identity of any organization, and needs to be given the same security. iPage […]
|
|
|
|
|
2014-12-22 16:31:09 |
What Does Fast Threat Emulation Mean? (lien direct) |
Your IT department has probably deployed multiple kinds of defenses to protect your network from malware. We are all familiar with antivirus and intrusion prevention programs. They protect us from known threats and are our first line of protection defense. Known threats are characterized and stored in a threat database. The more we know, the […]
|
|
|
|
|
2014-12-19 22:10:57 |
(Déjà vu) Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware (lien direct) |
The post Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware |
|
|
|
|
2014-12-18 18:40:41 |
(Déjà vu) Misfortune Cookie: The Hole in Your Internet Gateway (lien direct) |
What is the Misfortune Cookie vulnerability? Misfortune Cookie is a critical vulnerability that allows an intruder to remotely take over a residential gateway device and use it to attack the devices connected to it. Researchers from Check Point's Malware and Vulnerability Research Group recently uncovered this critical vulnerability present on millions of residential gateway (SOHO […]
|
|
|
|
|
2014-12-15 20:46:57 |
Mobile Security: Coming Soon To A Theater Near You (lien direct) |
The post Mobile Security: Coming Soon To A Theater Near You |
|
|
|
|
2014-12-12 16:48:35 |
Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open (lien direct) |
The post Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open |
|
|
|
|
2014-12-10 16:52:25 |
Aren\'t All Security Threat Emulations the Same? (lien direct) |
You should be picky when selecting a security solution for your network. When it comes to comparing solutions, are there really any metrics other than speed and accuracy? Those are certainly two of the most important, but there are some other important features as well. Our top three would be: 1. Access to the largest […]
|
|
|
|
|
2014-12-09 17:00:13 |
How we Collect Infections by the Numbers? (lien direct) |
We have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack all the time. Hackers have a lot of time on their hands and there is little downside for them to […]
|
|
|
|
|
2014-12-05 17:05:08 |
Sharing a Heritage of Innovation and “The Right Stuff†(lien direct) |
Last month, we introduced Capsule, a new way of securing your mobile environment and your critical documents. Today, we commend the United States and another capsule of innovation, the Orion. For those who missed the launch and landing, it brought to me the same thrill I felt as a kid, when I witnessed the Apollo […]
|
|
Heritage
|
|
|
2014-12-05 16:42:16 |
(Déjà vu) Mobile Security Weekly: Uber\'s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again (lien direct) |
The post Mobile Security Weekly: Uber’s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again |
|
Uber
|
|
|
2014-12-03 17:29:16 |
Let\'s Be Fair and Test Technology the Same Way We Use It. (lien direct) |
More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once an email hits their inbox, it has been scanned and is safe to open. But is it? We created the […]
|
|
|
|
|
2014-12-01 17:31:54 |
(Déjà vu) Man in the Binder: He Who Controls the IPC Controls the Droid (lien direct) |
At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the IPC, Controls the Droid.†Nitay and Idan's research of Android's unique operating system (OS) architecture showed the potential capture of […]
|
|
|
|
|
2014-11-28 16:47:58 |
Mobile Security Weekly: Black Friday Security Threats, On Sale Now! (lien direct) |
The post Mobile Security Weekly: Black Friday Security Threats, On Sale Now! |
|
|
|