What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2015-05-12 18:42:12 The Microsoft Help File (.chm) May Enslave You (lien direct)  “Microsoft Compiled HTML Help” is a Microsoft proprietary online help format that consists of a collection of HTML pages, indexing and other navigation tools. These files are compressed and deployed in a binary format with an extension of .CHM (compiled HTML).   Check Point researcher Liad Mizrachi has conducted research showing that .chm files can […] ★★★★★
Checkpoint.webp 2015-05-09 17:45:20 (Déjà vu) Android Under Attack! – Mobile Security Weekly (lien direct) The post Android Under Attack! – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-05-01 16:31:55 (Déjà vu) Apple\'s iOS Proven Vulnerable (Again!) as Android Leaks Biometric Info – Mobile Security Weekly (lien direct) The post Apple's iOS Proven Vulnerable (Again!) as Android Leaks Biometric Info – Mobile Security Weekly ★★★★
Checkpoint.webp 2015-04-29 13:58:25 Threat Alert: WordPress Cross-Site Scripting (lien direct) Overview   The WordPress content management system used by millions of websites is vulnerable to two newly discovered threats that allow attackers to take full control of the Web server. The attack code targets one of the latest versions of WordPress, making it a zero-day exploit that could set off a series of site hijackings […]
Checkpoint.webp 2015-04-24 15:00:04 Stopping the Next Massive Cyberattack (lien direct) Cybercriminals are quite pleased with themselves. Their recent handiwork has resulted in breaking news headlines, cover stories of major newspapers and banners flashing with details of the latest data breach. Unfortunately, the headlines displaying their successes leave their victims in a compromised, and often fiscal, mess. These cyber masterminds have become unpredictable in their methods […]
Checkpoint.webp 2015-04-20 13:59:47 Analyzing the Magento Vulnerability (Updated) (lien direct) Check Point researchers recently discovered a critical RCE (remote code execution) vulnerability in the Magento web e-commerce platform that can lead to the complete compromise of any Magento-based store, including credit card information as well as other financial and personal data, affecting nearly two hundred thousand online shops.   Check Point privately disclosed the vulnerabilities together […] Guideline
Checkpoint.webp 2015-04-16 19:45:00 Check Point Threat Alert – Simda (lien direct) Overview   The Simda botnet is a network of computers infected with self-propagating malware which has compromised more than 770,000 computers worldwide.   Since 2009, cyber criminals have been targeting computers with unpatched software and compromising them with Simda malware. This malware may re-route a user's Internet traffic to websites under criminal control or can […]
Checkpoint.webp 2015-04-16 17:19:38 Protecting Beyond the Point of Sale (lien direct) The sad reality is that retail breaches are becoming too common. With over a billion credit cards in circulation in the US and over 7 billion worldwide, credit card data has become a prime target for cybercriminals. An alarming number of data and network security breaches happen each year in the payment card and retail […]
Checkpoint.webp 2015-04-15 14:20:57 Check Point Threat Alert: AAEH/Beebone (lien direct) Overview   AAEH, also known as BeeBone, is a family of polymorphic downloaders created with the primary purpose of downloading other malware, including password stealers, rootkits, fake antivirus, and ransomware. AAEH is often propagated across networks, removable drives (USB/CD/DVD), and through ZIP and RAR archive files. Other aliases include VObfus, VBObfus, and Changeup. The polymorphic […]
Checkpoint.webp 2015-04-10 15:01:34 (Déjà vu) Mobile Security Market Grows, iOS Patched (AGAIN!), Encryption Has Hole – Mobile Security Weekly (lien direct) The post Mobile Security Market Grows, iOS Patched (AGAIN!), Encryption Has Hole – Mobile Security Weekly
Checkpoint.webp 2015-04-08 14:08:21 The Curious Incident of the Phish in the Night-Time: a Forensic Case Study (lien direct) Names have been changed to protect the privacy of the individuals involved.   On the morning of February 26, 2015, Laurie logged on to her Google account at work and discovered that overnight, someone had used her account as a stepping stone for a total, indiscriminate phishing campaign.   Laurie is the chief administrative assistant […] ★★★★
Checkpoint.webp 2015-04-01 17:54:33 Segmentation is Great in Theory, but Who Has the Time? (lien direct) Security is one of those, “pay a little now, or pay a lot later” concepts. Your data, your customer information, your intellectual property, your trade secrets, these are the lifeblood of your company. One bad hack could distract your team for months, set your product position back years or worse, put you out of business […] ★★★★
Checkpoint.webp 2015-03-31 13:59:29 Volatile Cedar – Analysis of a Global Cyber Espionage Campaign (lien direct) Today, we announced the discovery of Volatile Cedar, a persistent attacker group originating possibly in Lebanon with political ties. Beginning in late 2012, the carefully orchestrated attack campaign we call Volatile Cedar has been targeting individuals, companies and institutions worldwide. This campaign, led by a persistent attacker group, has successfully penetrated a large number of […] ★★★★★
Checkpoint.webp 2015-03-27 16:20:14 What Can We Learn from Clinton\'s “Email-gate”? (lien direct) Hillary Clinton has been scrutinized for using her private email account for Department of State-related correspondence. The so-called “email-gate” has put Mrs. Clinton in a hot-spot forcing her to provide explanations to what appears to be not only an attempt to hide official correspondence from the public but, more importantly, a breach in security.   […] ★★★★
Checkpoint.webp 2015-03-27 15:15:13 (Déjà vu) Half of Androids Vulnerable, Half of App Makers Eschew Security, iOS Jailbreak Coming – Mobile Security Weekly (lien direct) The post Half of Androids Vulnerable, Half of App Makers Eschew Security, iOS Jailbreak Coming – Mobile Security Weekly ★★★
Checkpoint.webp 2015-03-26 18:08:10 Intelligence Report: Equation Group (lien direct) Executive Summary The Equation Group, active since 2001, is a highly advanced and secretive computer espionage organization. The first report on Equation was published by Kaspersky during their 2015 Security Analyst Summit. The malware used in their operations, dubbed EquationDrug and GrayFish, is capable of reprogramming hard disk drive firmware. The group is using advanced techniques, predilection […] ★★★★★
Checkpoint.webp 2015-03-24 20:08:40 CuckooDroid – Fighting the Tide of Android Malware (lien direct) The future is mobile. Few experts doubt this conclusion these days. The accelerating proliferation of smartphones and other devices powered by the Android operating system throughout the world has created a corresponding increase in mobile apps – especially malicious mobile apps. This relatively new, but rapidly evolving, type of malware poses previously unseen dangers.   […] ★★★★★
Checkpoint.webp 2015-03-23 16:30:06 Go Atomic or Go Home (lien direct) Have you never heard the term 'Atomic Segment' used in security? Me neither. That is, until I came to Check Point. If you think about it, it makes a lot of sense. An atomic segment is a set of computing and networking elements that: (1) share a common security profile; (2) cannot further be subdivided […] ★★★★
Checkpoint.webp 2015-03-20 16:46:56 (Déjà vu) FREAK Lives On, Play Has Adware, iOS Brute-Force Attack – Mobile Security Weekly (lien direct) The post FREAK Lives On, Play Has Adware, iOS Brute-Force Attack – Mobile Security Weekly ★★★★
Checkpoint.webp 2015-03-19 17:23:12 Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus (lien direct) Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of a crucial component in the Windows operating system, and demonstrated the use of such an attack by revealing a previously unknown vulnerability in Bitdefender Anti-Virus.   The operating system component, known as NDIS, serves as the connecting layer between the […]
Checkpoint.webp 2015-03-13 14:49:17 Shiver Me Timbers! DDoS Attacks Caused by Pirate Bay Trackers and DNS Misconfigurations? (lien direct) In January of 2015 the Check Point Incident Response team (CPIR) had two DDoS attack cases from separate customers with similar characteristics: The first case: On Saturday January 10th a US Children's Hospital called the CPIR Emergency Hotline because they were suffering a DDoS attack.. After quick examination, the attack traffic was found to have […] ★★★★★
Checkpoint.webp 2015-03-12 20:28:54 Segmentation – the Simplest Security Policy Most People Miss (lien direct) In our 2014 Security Report, we highlighted a quote from Bill Cheswick, a world-renowned computer security expert, who in 1990 talked about first-generation network security focusing on perimeter protection. He called this simple perimeter security concept 'a sort of crunchy shell around a soft, chewy center.' The idea used to be that an organization's internal […] ★★★★★
Checkpoint.webp 2015-03-06 15:51:43 (Déjà vu) FREAK (Out!) Attack, Fake Amazon Voucher, Google Doesn\'t Encrypt – Mobile Security Weekly (lien direct) The post FREAK (Out!) Attack, Fake Amazon Voucher, Google Doesn’t Encrypt – Mobile Security Weekly ★★
Checkpoint.webp 2015-02-27 15:54:37 (Déjà vu) iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly (lien direct) The post iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly ★★
Checkpoint.webp 2015-02-24 15:06:20 Is Software Defined Protection the New Software Defined Networking? (lien direct) Software Defined Networking (SDN) is the latest buzz term to take over the networking world – and is not to be overlooked. With the goal of automating network infrastructure functions that used to be fixed or manual, the aim is to take complex configuration tasks and make them programmable. When implemented correctly, it should make […]
Checkpoint.webp 2015-02-20 22:24:23 Angler Exploit Kit – Blocking Attacks Even Before Zero Day (lien direct) The Story Blocking attempts to use exploit kits (EK) against our customers is one of Check Point’s main targets in IPS. Thus, our Intelligence Teams follow closely the trends in this world. On late December, we noticed hype around a specific EK, namely, Angler EK, and decided to give high priority to writing an IPS […]
Checkpoint.webp 2015-02-19 22:22:22 Malware Analysis 101 (lien direct) Introduction A common misconception about malware is the great difficulty of performing malware analysis and the technical requirements involved. When many technical users are faced with a malware infection and asked to analyze it, they may think, “Hey, I’ve heard about this kind of malware. I’ve even read some malware reports, and they sound really […]
Checkpoint.webp 2015-02-19 20:45:14 Malware Analysis – CTB-Locker (lien direct) Executive Summary CTB (Curve-Tor-Bitcoin) Locker is a crypto-ransomware variant. It is based on advanced algorithms which are used in different combinations, making CTB-Locker significantly more difficult to detect and neutralize. CTB-Locker (aka Critroni or Onion) is based on a so-called encryptor, which encrypts all of a user's personal data and extorts payment to decrypt the […]
Checkpoint.webp 2015-02-19 12:51:46 Targeted Attacks on Enterprise Mobile Exposed in New Threat Research (lien direct) The post Targeted Attacks on Enterprise Mobile Exposed in New Threat Research
Checkpoint.webp 2015-02-13 16:42:30 (Déjà vu) New Android Trojans, Gremlins Inside Play, iPhone\'s Safe and Sound – Mobile Security Weekly (lien direct) The post New Android Trojans, Gremlins Inside Play, iPhone's Safe and Sound – Mobile Security Weekly ★★
Checkpoint.webp 2015-02-10 16:20:39 Demystifying iOS Enterprise Certificates (lien direct) The post Demystifying iOS Enterprise Certificates ★★★★★
Checkpoint.webp 2015-02-06 17:37:08 (Déjà vu) iOS Attacked (Again), Play\'s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly (lien direct) The post iOS Attacked (Again), Play’s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-02-06 17:31:26 Your Malware Would Like To Phone a Friend (lien direct) The post Your Malware Would Like To Phone a Friend ★★★
Checkpoint.webp 2015-02-05 17:30:43 Clever and Persistent Android Banking Trojan Discovered (lien direct) The post Clever and Persistent Android Banking Trojan Discovered ★★★★★
Checkpoint.webp 2015-02-03 21:02:35 Cyberthieves Can Score a Data Touchdown with Unencrypted Apps (lien direct) The post Cyberthieves Can Score a Data Touchdown with Unencrypted Apps ★★★
Checkpoint.webp 2015-01-30 15:55:55 (Déjà vu) Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly (lien direct) The post Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-01-26 20:52:08 Threat Advisory – CVE-2014-7911: A New Root Exploit for Android (lien direct) The post Threat Advisory – CVE-2014-7911: A New Root Exploit for Android ★★
Checkpoint.webp 2015-01-23 16:49:54 (Déjà vu) Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly (lien direct) The post Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly ★★
Checkpoint.webp 2015-01-20 18:58:29 Presto Change-o, Pixel Battery Saver Transforms into Potential Malware (lien direct) The post Presto Change-o, Pixel Battery Saver Transforms into Potential Malware ★★★★★
Checkpoint.webp 2015-01-16 15:05:13 (Déjà vu) Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly (lien direct) The post Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-01-09 15:05:24 (Déjà vu) Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly (lien direct) The post Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-01-09 01:25:54 Diving into a Silverlight Exploit and Shellcode – Analysis and Techniques (lien direct) In recent years, exploit-kits have become one of the most common platforms for malware distribution. One of the exploits coming from Infinity exploit-kit exploits a security vulnerability in Microsoft Silverlight. Compared to other technologies like Java, PDF, Flash, etc. – Silverlight exploits are less common. Just to get a rough feeling, according to cvedetails.com, from […]
Checkpoint.webp 2014-12-31 16:47:54 Mobile Security 2014: The Year In Review (lien direct) The post Mobile Security 2014: The Year In Review
Checkpoint.webp 2014-12-27 03:42:17 Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping (lien direct) The post Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping
Checkpoint.webp 2014-12-23 11:14:53 Your Website Should Reflect Your Brand – Not an Attacker\'s (lien direct) When IT professionals and business owners think about their security strategies, they often forget about one of the easiest assets for cyber criminals to attack: their websites. From consumer brands to small businesses to large enterprise companies, a website is the front-facing identity of any organization, and needs to be given the same security. iPage […]
Checkpoint.webp 2014-12-22 16:31:09 What Does Fast Threat Emulation Mean? (lien direct) Your IT department has probably deployed multiple kinds of defenses to protect your network from malware. We are all familiar with antivirus and intrusion prevention programs. They protect us from known threats and are our first line of protection defense. Known threats are characterized and stored in a threat database. The more we know, the […]
Checkpoint.webp 2014-12-19 22:10:57 (Déjà vu) Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware (lien direct) The post Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware
Checkpoint.webp 2014-12-18 18:40:41 (Déjà vu) Misfortune Cookie: The Hole in Your Internet Gateway (lien direct) What is the Misfortune Cookie vulnerability? Misfortune Cookie is a critical vulnerability that allows an intruder to remotely take over a residential gateway device and use it to attack the devices connected to it. Researchers from Check Point's Malware and Vulnerability Research Group recently uncovered this critical vulnerability present on millions of residential gateway (SOHO […]
Checkpoint.webp 2014-12-15 20:46:57 Mobile Security: Coming Soon To A Theater Near You (lien direct) The post Mobile Security: Coming Soon To A Theater Near You
Checkpoint.webp 2014-12-12 16:48:35 Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open (lien direct) The post Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open
Last update at: 2024-05-31 01:08:04
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter