What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2016-11-21 14:00:15 October\'s \'Most Wanted\' Malware List Shows Attacks on the Rise (lien direct) Check Point's Threat Intelligence Research Team revealed today that the number of malware attacks increased in October, as the company released its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organizations' networks. The team found that both the number of active malware families and number of attacks increased by 5% […]
Checkpoint.webp 2016-11-15 22:00:10 Can SandBlast Block Unknown Attacks? Challenge Accepted, Network World! (lien direct) Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found SandBlast to be a comprehensive yet easy to manage solution, which is worth the cost for effective protection against unknown […]
Checkpoint.webp 2016-11-11 22:15:41 Clearing the fog: a vision of security for hybrid clouds (lien direct) Have you ever driven on a high road or mountain pass that's shrouded by low cloud? You're at the familiar controls of your vehicle, but you can't easily see road-signs, oncoming vehicles, which way the road goes, or other dangers. Progress can be hazardous unless you take extra precautions. The feeling will be familiar to […]
Checkpoint.webp 2016-11-08 14:00:52 Denied! Dealing with Global Distributed Denial of Service (lien direct) Cyber security has recently reached yet a new level of public awareness, as the world learned that an army of bots hosted on internet connected cameras were able to cause outages to well-known internet services such as Twitter, Amzaon, Spotify and Netflix. The global Distributed Denial of Service (DDoS) attack on DYN, a large DNS […]
Checkpoint.webp 2016-11-02 13:00:32 Beware! Malware Targeting Endpoints on the Rise Ahead (lien direct) All you need to do is listen to the news and you know that the cyber threat landscape in 2016 has gotten much worse. But what types of threats are driving companies to take action? And what actions are they taking? To answer these questions, and more, we turned to SANS Institute, the leading organization […] Guideline
Checkpoint.webp 2016-10-28 13:00:01 Global Trends of the \'Most Wanted\' Malware (lien direct) The malware world continues to develop rapidly and dynamically. On a daily basis new malware appears, accelerating the cat-and-mouse game between attackers and defenders. As a result, it's more important than ever for cyber security professionals to stay up-to-date about the ever-changing threat landscape in order to provide organizations with the highest level of protection. […]
Checkpoint.webp 2016-10-25 13:00:34 Check Point\'s Cyber Security Predictions for 2017 (lien direct) 2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no one is immune to sophisticated cyberattacks. According to the Identity Theft Resource Center, as of October 19th of this year […]
Checkpoint.webp 2016-10-24 13:00:07 6 Tips to Outsmart the Phishermen (lien direct) Brian Kernighan once said, “If you don’t understand viruses, phishing, and similar cyber threats, you become more susceptible to them.” With cyber scams constantly increasing in sophistication, this statement is especially true today. So, what exactly is phishing? In a phishing attack, a hacker creates an email that appears to be legitimate and sends it […]
Checkpoint.webp 2016-10-21 13:00:33 September\'s \'Most Wanted\' Malware List: Ransomware in Top 3 for First Time (lien direct) The Check Point Research Team revealed this week that ransomware attacks continued to rise in September. For the first time since the team launched the Threat Index, ransomware moved into the top three position of the most prevalent malware, with the Locky ransomware accounting for 6 percent of all recognized attacks globally during the month. […]
Checkpoint.webp 2016-10-19 13:00:39 Phishing: Reeling in Enterprises for Hefty Profits (lien direct) Can you believe that phishing, the scam that tricks users into giving away sensitive information like their credit card numbers and bank login credentials, is still with us after more than twenty years? Phishing is still here because criminals keep devising new ways to make it work. However, new phishing methods take more effort, but […]
Checkpoint.webp 2016-10-18 11:02:19 Outstanding Results – Check Point Achieves 3rd NSS Recommended Rating This Year (lien direct) Great news! I'm glad to report we achieved another NSS Recommended in their recent NGIPS Group Test! This is our 3rd NSS Recommended this year and our 13th since we began working with NSS Labs in 2011. The previous two tests this year measured our Next Generation Firewall capabilities and the Breach Detection System (advanced […]
Checkpoint.webp 2016-10-14 18:39:17 Join Check Point at SecTor to learn how to go beyond traditional security with advanced threat prevention (lien direct) Next week, Check Point will be at SecTor, Canada's premier IT security education conference. The conference brings the world's brightest (and darkest) minds together to identify, discuss, dissect and debate the latest digital threats facing corporations today. The conference has assembled a line-up of industry experts who will share some of the most engaging, educational […]
Checkpoint.webp 2016-10-14 17:53:38 Android Updates: Hurry Up and Wait   (lien direct) Google, device makers and carriers take too long to update Android vulnerabilities. In fact, while it takes Apple just days to update iOS when it finds a vulnerability, Threatpost points out that it can take Google weeks or even months to do the same for Android. Apple needed only ten days to fix Trident vulnerabilities in iOS, but it took Google […]
Checkpoint.webp 2016-10-12 17:11:01 4 Tips on How to Respond to a Ransomware Attack (lien direct) Benjamin Franklin said, “An ounce of prevention is worth a pound of cure.” In the world of cyber security, it is indeed essential that organizations take steps to prevent ransomware from attacking their organizations and taking their data hostage. However, despite even the most extravagant and precautious preparations, some attacks may still get through. Knowing […]
Checkpoint.webp 2016-10-07 13:00:59 Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment (lien direct) At the Virus Bulletin conference yesterday in Denver, Check Point researchers Stanislav Skuratovich and Aliaksandr Chailytko gave a talk detailing how cyber security professionals can defeat sandbox evasion. In case you weren’t able to attend the conference, we’ve provided a summary of their presentation below. The malware world is a dynamic one. As soon as sandboxes appeared, […]
Checkpoint.webp 2016-10-06 18:57:59 5 Tips to Fight Back Against Ransomware (lien direct) Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? What is it, you ask? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to protect themselves from cyber threats. As the largest network cyber security vendor globally, Check Point […]
Checkpoint.webp 2016-10-06 13:00:17 Great Crypto Failures – When Malware Goes Wrong (lien direct) Yesterday at the Virus Bulletin conference in Denver, Check Point researchers Yaniv Balmas and Ben Herzog presented “Great Crypto Failures”, a lecture about the cryptography mishaps made by cyber criminals. Cryptography is a major part of many malware functionalities today. It's used to disguise malware, allow it to bypass security measures, create a communication channel […]
Checkpoint.webp 2016-10-05 17:16:32 The Cloud: Rethinking IT Security Roles (lien direct) Whether you lead a team of IT professionals-or are the team-tasks like swapping power supplies and tinkering with the datacenter's air conditioning are quickly transitioning to people in cloud-computing centers. Cisco estimates 83 percent of data center traffic will become cloud traffic by 2019.[i] Moving to the cloud is a significant change from static hardware-based […] Guideline
Checkpoint.webp 2016-09-29 13:00:06 Antivirus Isn\'t Dead, But It\'s No Panacea (lien direct) It should come as no surprise that antivirus solutions on their own are not equipped to deal with many of the threats we see today. Norton Antivirus stated as much back in 2014 when it famously declared, “Antivirus is dead.” The claim was not an indication that such products would be discontinued, but more an […]
Checkpoint.webp 2016-09-28 13:00:32 Ransomware: Steal Smarter, Not Harder (lien direct) Occasionally, even cybercriminals must revamp their “product lines.” They do this when their bread-and-butter malware stops making money due to new security measures, or if they invent a better way to rip people off. Check Point security researchers have caught criminals in the act ramping up ransomware attacks while scaling back banking Trojans. We believe […]
Checkpoint.webp 2016-09-27 16:51:52 Signature-based security solutions can leave networks defenseless for months (lien direct) Can you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass traditional security solutions the malware was finally detected by a major enterprise email solution provider. The sample, a Cerber variant, […]
Checkpoint.webp 2016-09-22 17:50:07 Gartner Recognizes the Importance of Mobile Threat Defense (lien direct) HummingBad. Stagefright. QuadRooter. Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend – one that our research team encounters daily – is illustrated in the Gartner Market Guide for Mobile Threat Defense Solutions.* […]
Checkpoint.webp 2016-09-21 22:42:16 (Déjà vu) On Their Best Behavior: Securing iOS and Android in the Enterprise (lien direct) In today's business environment, using mobile devices isn't just a business requirement, it's an employee expectation. But for some organizations, these devices present security challenges that prevent or limit their ability to support a fully mobile enterprise. It's not enough that they just deploy or manage iOS and Android devices, they also need to defend […]
Checkpoint.webp 2016-09-20 14:00:51 Will your virtual data traffic take the detour around firewalls? (lien direct) We're going to need a new term to talk about “data centers.” I say this because virtualization in public and private form factors means the locations of processors and other resources you use on-demand don't sit statically in a data center anymore. Virtual resources dart around like bees in a field of clover. When will […]
Checkpoint.webp 2016-09-19 13:00:32 August\'s Top 10 Most Wanted Malware (lien direct) Today, Check Point revealed that both the number of variants of ransomware and volume of malware attacks were on the rise in August, as the company disclosed the most prevalent malware families attacking organizations' networks in the period. During August, the number of active ransomware families grew by 12 percent while the number of detected […]
Checkpoint.webp 2016-09-16 14:00:41 In The Wild: App Stores Are No Sanctuary for Mobile Malware (lien direct) Most mobile users rely on Google Play and the Apple App Store for their safety and assume that by downloading only highly-rated apps from these stores keeps them safe from mobile malware. In the past, this might have been a good strategy, but today it doesn't always work. Breaking the Myth: Google Play The Check […]
Checkpoint.webp 2016-09-09 22:16:26 (Ir)responsible Disclosure (lien direct) Computers have become an essential part of our lives, and in some cases, they are even responsible for keeping us alive. Our dependency to use computers for medical treatments such as diagnostic equipment, medical monitors and even life support is greater than ever. Technology has given the medical sector new and inspirational ways to continue […]
Checkpoint.webp 2016-09-08 17:30:29 CallJam Android Malware Found on Google Play (lien direct) Keeping Android smartphones and tablets safe from malicious apps is a constant battle for enterprises, end users, and for Google. Despite Google's efforts to prevent cybercriminals from infiltrating Google Play, the Check Point mobile research team has discovered new Android malware there it calls CallJam. CallJam malware includes a premium dialer to generate fraudulent phone […]
Checkpoint.webp 2016-09-08 17:00:56 Life After QuadRooter: Measuring The Impact (lien direct) Following Check Point's disclosure of QuadRooter at Black Hat USA on August 7, the free QuadRooter scanner app was downloaded over half a million times. The results of the scans Check Point collected show that almost two thirds of scanned devices were affected. These reports also offer a unique opportunity to analyze a large sample […]
Checkpoint.webp 2016-09-08 13:00:58 Pixel Tracking: A Hacker\'s Tool (lien direct) What is pixel tracking? It's challenging to justify the effectiveness of an email campaign if you can't measure its success. So, what do you do? You use pixel tracking, a seemingly innocent sales tool that helps sales and marketing teams track their campaigns. Tracking pixels are embedded into emails and load when the recipient opens […]
Checkpoint.webp 2016-09-07 22:58:22 Email from PayPal? Don\'t Get Attached! (lien direct) Introduction Phishing scams are fraudulent email messages that appear to come from legitimate enterprises such as your university, your Internet service provider, or your bank. These messages usually direct you to a spoofed website, have a malicious attachment, or otherwise get you to divulge private information. The perpetrators then use this information to commit identity theft. […]
Checkpoint.webp 2016-09-07 13:00:06 Closing the Cloud Security Gaps (lien direct) Regardless of where your applications and data reside – whether in private, public or hybrid cloud environments – they are attractive targets. Protecting assets in the cloud requires the same comprehensive security used to protect your physical environments. However, the dynamic and elastic nature of the cloud make traditional security approaches ineffective, exposing organizations and […]
Checkpoint.webp 2016-09-01 17:15:51 Check Point Forensics: PokemonGo Ransomware\'s Hidden Unexpected User (lien direct) It was inevitable. Given the popularity of PokemonGo, ransomware developers have already attempted to trick users into downloading malware that claims to be PC versions of the popular mobile game. There are currently already two known ransomware variants that attempt to capitalize on the mobile games popularity by naming their executables pokemongo.exe. BleepingComputer has already […]
Checkpoint.webp 2016-08-31 19:15:00 DressCode Android Malware Discovered on Google Play (lien direct) The Check Point mobile threat prevention research team discovered a new Android malware on Google Play, called “DressCode,” which was embedded into more than 40 apps, and found in more than 400 additional apps on third party app stores. Check Point notified Google about the malicious apps, and some have already been removed from Google […]
Checkpoint.webp 2016-08-31 15:42:18 Check Point Spearheads Threat Prevention Security for Small and Medium Businesses (lien direct) Small and medium-sized business owners typically think the security that protects their large enterprises counterparts is well out of reach in terms of costs and complexities. However recent shifts in the threat landscape have them rethinking their security strategies. Cybercriminals are equal opportunists who leverage the same tactics used on bigger enterprises to target smaller […]
Checkpoint.webp 2016-08-30 21:08:08 Whaling: The Hunt for High Profile Business Targets (lien direct) What are whaling attacks? “Whaling” attacks, also called Business Email Compromise (BEC), are a newer form of phishing attack. Phishing attacks consist of messages sent to would-be victims that try to deceive them into clicking malicious links, or opening an attachment that contains malware. Phishing attacks have evolved drastically, in part due to growing awareness […]
Checkpoint.webp 2016-08-29 07:01:40 Beware of the Trident Exploits (lien direct) Researchers from The Citizen Lab at the University of Toronto last week revealed a sophisticated zero-day attack on the iPhone of Ahmed Mansoor, a human rights activist in the United Arab Emirates. The Citizen Lab discovery exposed three zero-day exploits used by “Pegasus,” a lawful interception cyberespionage tool developed by the Israeli-based NSO Group and […]
Checkpoint.webp 2016-08-26 13:00:42 Web Scripting Language PHP-7 Vulnerable to Remote Exploits (lien direct) Exploiting server side bugs is a jackpot for hackers. Users tend to keep their data in one big pot – the server. This allows attackers to focus on one target, instead of individual users, making it possible for them to achieve greater results. This approach has been extremely profitable for attackers with various goals ranging […]
Checkpoint.webp 2016-08-25 22:26:03 Advancing the Security of Your SDDC (lien direct) VMworld US is rapidly approaching and we've been busy gearing up for a great show! In fact, the product team has been especially busy building new features and capabilities into our vSEC Cloud Security product portfolio which we'll showcase during VMworld. While businesses of all sizes are making significant strides to virtualize networks and leverage […]
Checkpoint.webp 2016-08-24 17:00:07 The QuadRooter Domino Effect (lien direct) Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities — both in hardware and software — can be found on the smartphones and tablets we trust with our sensitive data. Until a patch for a vulnerability is installed, an affected device is exposed. That’s why fixing vulnerabilities like QuadRooter […]
Checkpoint.webp 2016-08-24 13:00:44 The Evolution of Proxy (lien direct) When I entered the security market nearly 20 years ago, the philosophical and almost religious debate was whether proxy was a better technology than stateful inspection. Back then stateful firewalls were all about access control and proxy servers were interrupting a web connection to prevent direct internet exposure, and the “smart” ones were able to […]
Checkpoint.webp 2016-08-23 17:44:30 Phishing scams target everyone – even us! (lien direct) Phishing scams have been around for over twenty years. It appears unlikely that they will ever go away. Targeting anyone with an email address, they continue to be a persistent threat. Recently, even some of Check Point's executives were recently targeted. The below email, purportedly from PayPal, is an example of emails that potential victims […]
Checkpoint.webp 2016-08-22 19:05:59 Check Point Forensic Files: Proving Ranscam ransomware does not provide a way to recover files (lien direct) Every week we see new ransomware variants as cyber criminals continue to generate revenue from holding victims’ files for ransom. In July, a new ransomware was discovered that is an out-and-out scam. It does not encrypt any files; it simply deletes all user files. It then demands a ransom for recovery of the files, but […]
Checkpoint.webp 2016-08-18 13:00:21 July\'s Top 10 Most Wanted Malware (lien direct) Check Point Software Technologies today revealed the number of active malware families decreased by 5 percent in July, as the company disclosed the most prevalent malware families attacking organizations' networks in the month. During July, Check Point detected 2,300 unique and active malware families attacking business networks, a 5 percent increase compared to June, with […]
Checkpoint.webp 2016-08-16 13:00:25 CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service (lien direct) Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business model and money trail. For the full CerberRing Report click here. The ransomware epidemic continues to rage on, encrypting files of private and enterprise users alike. Ransomware has become a global problem. According to the FBI, the accumulated revenue in the […]
Checkpoint.webp 2016-08-07 20:53:21 QuadRooter: New Android Vulnerabilities in Over 900 Million Devices (lien direct) Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities QuadRooter, presented its findings in a session at DEF CON 24 in Las Vegas. What is QuadRooter? QuadRooter is a […]
Checkpoint.webp 2016-08-02 13:00:50 SandBlast Receives ‘Recommended’ Rating Once Again (lien direct) Hackers continue to target organizations with advanced malware. With over 390,000 new malware variants created each day1, traditional security solutions don't stand a chance in this cat and mouse game. Organizations are constantly striving to ensure protections are top notch to defend their organizations against ever-persistent cyber attackers. An essential ingredient to successfully block unknown […]
Checkpoint.webp 2016-08-02 13:00:18 Secure Every Click – Check Point SandBlast™ Agent for Browsers (lien direct) Internet users expect near-instant and unconstrained access to web content when browsing. Unfortunately, the web poses one of the greatest threats to enterprises today. Malware may be hidden in web-downloaded content or webmail attachments. Your employees may unknowingly become victims of phishing, social engineering, and other malware-less attacks aimed at stealing corporate passwords and sensitive […]
Checkpoint.webp 2016-07-26 13:00:42 Ransomware: what you need to know (lien direct) In recent years, there has been a surge of ransomware attacks. It's been reported all over security blogs, tech websites and in the news. Unfortunately, these attacks show no signs of slowing. If anything, they are getting worse. Cryptolocker, the first famous ransomware, was observed in the wild in 2013. From then until mid-2015, there […]
Checkpoint.webp 2016-07-22 14:00:51 Securely Embrace the Hybrid Cloud (lien direct) The trend in enterprise IT is to move from a hardware-centric to an application-centric network model, enabling businesses to streamline processes and improve end-user experiences, all while enhancing their competitive positioning. As a result, IT organizations are under tremendous pressure to rapidly transform in order to keep pace with these new business demands. This need […]
Last update at: 2024-05-31 04:08:04
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter