What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2014-12-12 16:48:35 Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open (lien direct) The post Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open
Checkpoint.webp 2014-12-10 16:52:25 Aren\'t All Security Threat Emulations the Same? (lien direct) You should be picky when selecting a security solution for your network. When it comes to comparing solutions, are there really any metrics other than speed and accuracy? Those are certainly two of the most important, but there are some other important features as well. Our top three would be: 1. Access to the largest […]
Checkpoint.webp 2014-12-09 17:00:13 How we Collect Infections by the Numbers? (lien direct) We have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack all the time. Hackers have a lot of time on their hands and there is little downside for them to […]
Checkpoint.webp 2014-12-05 17:05:08 Sharing a Heritage of Innovation and “The Right Stuff” (lien direct) Last month, we introduced Capsule, a new way of securing your mobile environment and your critical documents. Today, we commend the United States and another capsule of innovation, the Orion. For those who missed the launch and landing, it brought to me the same thrill I felt as a kid, when I witnessed the Apollo […] Heritage
Checkpoint.webp 2014-12-05 16:42:16 (Déjà vu) Mobile Security Weekly: Uber\'s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again (lien direct) The post Mobile Security Weekly: Uber’s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again Uber
Checkpoint.webp 2014-12-03 17:29:16 Let\'s Be Fair and Test Technology the Same Way We Use It. (lien direct) More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once an email hits their inbox, it has been scanned and is safe to open. But is it? We created the […]
Checkpoint.webp 2014-12-01 17:31:54 (Déjà vu) Man in the Binder: He Who Controls the IPC Controls the Droid (lien direct) At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the IPC, Controls the Droid.” Nitay and Idan's research of Android's unique operating system (OS) architecture showed the potential capture of […]
Checkpoint.webp 2014-11-28 16:47:58 Mobile Security Weekly: Black Friday Security Threats, On Sale Now! (lien direct) The post Mobile Security Weekly: Black Friday Security Threats, On Sale Now!
Checkpoint.webp 2014-11-25 16:04:29 Has Your Android Device Been Fakedebuggered? (lien direct) The post Has Your Android Device Been Fakedebuggered?
Checkpoint.webp 2014-11-21 19:21:32 (Déjà vu) Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy (lien direct) The post Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy
Checkpoint.webp 2014-11-21 16:39:53 A Look Ahead: Mobile Security Predictions for 2015 (lien direct) The post A Look Ahead: Mobile Security Predictions for 2015
Checkpoint.webp 2014-11-20 17:34:49 New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition (lien direct) If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the performance of five security products. They specifically focused on products claiming superior performance for Advanced Threat Detection to determine the […] Guideline
Checkpoint.webp 2014-11-20 17:21:47 A Billion Android Devices Exposed - Are you at risk? (lien direct) The post A Billion Android Devices Exposed — Are you at risk?
Checkpoint.webp 2014-11-18 01:29:25 Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach? (lien direct) The post Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach?
Checkpoint.webp 2014-11-14 16:45:56 Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up (lien direct) The post Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up
Checkpoint.webp 2014-11-12 08:15:47 When it Comes to Security, What is Good Enough? (lien direct) Ben Franklin once said that an ounce of prevention is better than a pound of cure. We couldn't agree more when it comes to network security. From both time and financial standpoints, it is much more cost effective to prevent infections than deal with their aftermath. Infection cleanup is very costly to businesses. The latest […]
Checkpoint.webp 2014-11-10 17:45:06 (Déjà vu) Immobilize WireLurker Before It Immobilizes You (lien direct) A recent malware, “WireLurker”, affects Apple OS X and iOS. As highlighted in the recent announcement by Check Point on mobile security, the amount of mobile malware is on the rise. In this case, WireLurker affects both desktop and mobile platforms. The infection starts through trojanized and repackaged OS X applications. It then transfers to […]
Checkpoint.webp 2014-11-06 17:53:10 WireLurker Exposes iOS Security – Jailbreak Not Required (lien direct) The post WireLurker Exposes iOS Security – Jailbreak Not Required
Checkpoint.webp 2014-11-03 17:47:22 At the heart of Zero Day are 1440 minutes. What can happen in one minute? (lien direct) At Check Point, we live in the same business world everyone else does, where we have to operate at the speed of our customers. In our case, though, one mistake impacts a lot more than just our own network. The speed of business and being responsive to customers and stakeholders is a key metric for […] ★★★★★
Checkpoint.webp 2014-11-03 08:24:41 Plugging the Security Hole in a WordPress Plug-In (lien direct) Check Point researcher, Roi Paz recently discovered a critical vulnerability that would have enabled attackers to steal personal and financial data from thousands of websites and their visitors via the LiveSupporti WordPress plug-in. After being alerted to the situation, LiveSupporti plugged the security hole. LiveSupporti is a software service that enables website visitors to engage in […] ★★
Checkpoint.webp 2014-10-31 16:40:32 (Déjà vu) Mobile Security Weekly – Three New But Classic iOS and Android Attacks (lien direct) The post Mobile Security Weekly – Three New But Classic iOS and Android Attacks ★★★
Checkpoint.webp 2014-10-24 17:47:44 (Déjà vu) Mobile Security Weekly – iOS Jailbroken, Knox Cracked, Android Exposed (Again) (lien direct) The post Mobile Security Weekly – iOS Jailbroken, Knox Cracked, Android Exposed (Again) ★★
Checkpoint.webp 2014-10-06 17:57:21 Bug in the Bug Tracker (lien direct) On September 29th, Check Point's Malware and Vulnerability Research Group uncovered a critical privilege escalation vulnerability in the popular bug-tracking platform called Bugzilla. According to the CVE security vulnerability database (cvedetails.com), this is the first privilege escalation bug uncovered in the Bugzilla project since 2002. (See also: Bugzilla Zero-Day Exposes Zero-Day Bugs by Brian Krebs) […] ★★
Checkpoint.webp 2014-10-04 06:43:48 (Déjà vu) Mobile Security Weekly – Lacoon Discovers the Xsser mRAT (lien direct) The post Mobile Security Weekly – Lacoon Discovers the Xsser mRAT ★★★★
Checkpoint.webp 2014-09-30 19:39:41 (Déjà vu) Lacoon Discovers Xsser mRAT, the First Advanced Chinese iOS Trojan (lien direct) The post Lacoon Discovers Xsser mRAT, the First Advanced Chinese iOS Trojan ★★
Checkpoint.webp 2014-09-29 15:24:11 (Déjà vu) Shellshock A.K.A Bash Bug – A Serious Vulnerability That Could Affect Rooted or Jailbroken Mobile Devices (lien direct) The post Shellshock A.K.A Bash Bug – A Serious Vulnerability That Could Affect Rooted or Jailbroken Mobile Devices ★★★★
Checkpoint.webp 2014-09-29 07:28:56 (Déjà vu) Vulnerability Discovered Within Default Android Web Browser (lien direct) The post Vulnerability Discovered Within Default Android Web Browser
Checkpoint.webp 2014-09-25 17:59:53 Protecting Yourself Against Shellshock (lien direct) Note: This is a developing story. Check Point will provide updates as additional information becomes available. Check Point strongly encourages organizations to take action and understands how fixes and protections work in order to minimize their exposure and avoid introducing new problems. What is Bash and Shellshock? Bourne Again Shell, also referred to as Bash […] ★★
Checkpoint.webp 2014-09-21 08:03:04 (Déjà vu) Mobile Security Weekly – A Whole New iWorld (lien direct) The post Mobile Security Weekly – A Whole New iWorld ★★
Checkpoint.webp 2014-09-18 15:51:24 iOS 8: Newer, better, but is it safer? (lien direct) The post iOS 8: Newer, better, but is it safer? ★★★
Checkpoint.webp 2014-09-16 13:30:45 Don\'t Let Mobile Spy App Windseeker Get Caught in Your Sail (lien direct) The post Don’t Let Mobile Spy App Windseeker Get Caught in Your Sail ★★
Checkpoint.webp 2014-09-08 18:25:12 (Déjà vu) Mobile Security Weekly – Why Is iCloud Raining On Us? (lien direct) The post Mobile Security Weekly – Why Is iCloud Raining On Us? ★★★★
Checkpoint.webp 2014-09-05 23:30:25 Snap, Click, Save, Leak. Think You\'re Safe? Think again. (lien direct) The post Snap, Click, Save, Leak. Think You're Safe? Think again. ★★★★★
Checkpoint.webp 2014-09-01 08:06:50 (Déjà vu) Mobile Security Weekly – A New Arena: Wearable Tech Security (lien direct) The post Mobile Security Weekly – A New Arena: Wearable Tech Security ★★★★
Checkpoint.webp 2014-08-23 19:10:20 (Déjà vu) Mobile Security Weekly – Are iOS and Android full of holes or is it just Gamma Group? (lien direct) The post Mobile Security Weekly – Are iOS and Android full of holes or is it just Gamma Group? ★★★
Checkpoint.webp 2014-08-17 03:15:40 (Déjà vu) Mobile Security Weekly – Bringing the Hammer Down on Mobile Threats (lien direct) The post Mobile Security Weekly – Bringing the Hammer Down on Mobile Threats ★★★★
Checkpoint.webp 2014-08-16 21:50:36 Practical Attacks Against VDI and Augmenting Mobile Security (lien direct) The post Practical Attacks Against VDI and Augmenting Mobile Security ★★
Checkpoint.webp 2014-08-13 13:38:04 Are Malicious Configuration Profiles iOS\' Achilles Heel? (lien direct) The post Are Malicious Configuration Profiles iOS’ Achilles Heel? ★★★
Checkpoint.webp 2014-08-12 13:50:36 (Déjà vu) Mobile Security Weekly – Android Threats Stack Up (lien direct) The post Mobile Security Weekly – Android Threats Stack Up ★★★★
Checkpoint.webp 2014-08-11 18:12:30 Check Point Protects from the HAVEX Malware Targeting ICS/SCADA Systems (lien direct) Dragonfly Cyber Espionage campaign overview Havex is a Remote Administration Tool (RAT) used recently by the “dragonfly” cyber espionage group. They were using the Havex malware to target Industrial Control Systems (ICS) and SCADA systems at energy companies across Europe and the US. Several methods were used to infect computers with the Havex RAT, such […] ★★★
Checkpoint.webp 2014-08-11 18:08:56 GOZ – Is it game over, Zeus? (lien direct) Overview Zeus is a highly sophisticated family of Trojans that seeks to steal banking information and accounts from victims. Zeus targets popular operating systems such as Windows and Android and is usually distributed to end-users through social engineering tactics such drive-by downloads and phishing emails. Although Zeus was discovered back in 2007, it remains popular […] ★★★★
Checkpoint.webp 2014-08-11 18:05:29 Protecting computers from the damages of RAMDO Click Fraud Trojan (lien direct) Details Ramdo is a family of Trojan horses which performs click fraud. This type of Trojan program is used to increase the number of visits on certain websites or to boost the number of hits for online ads. Ramdo installs itself by using an exploit kit, copies itself onto the system and creates an encrypted […] ★★
Checkpoint.webp 2014-08-11 08:42:13 Don\'t Become the Next Code Spaces: Learn best practices for using cloud services securely (lien direct) Overview Code Spaces, which offered source code repositories and project management services hosted in Amazon's Web Services for developers, was forced to cease operations in June after failing to meet the demands of cyber-extortionists. The company was first hit with a Distributed Denial of Service (DDoS) attack, followed by a devastating cyber breach that, in an instant, […] ★★
Checkpoint.webp 2014-08-04 13:30:56 VDI Solutions: Background, Threats & Mitigation (lien direct) The post VDI Solutions: Background, Threats & Mitigation ★★★★★
Checkpoint.webp 2014-08-02 12:01:08 (Déjà vu) Mobile Security Weekly – Countdown to Blackhat US (lien direct) The post Mobile Security Weekly – Countdown to Blackhat US ★★★★★
Checkpoint.webp 2014-07-29 11:42:47 Android \'Fake ID\' can Impersonate your Trusted Apps (lien direct) The post Android 'Fake ID' can Impersonate your Trusted Apps ★★★
Checkpoint.webp 2014-07-27 11:37:28 (Déjà vu) Mobile Security Weekly – Trust Issues (lien direct) The post Mobile Security Weekly – Trust Issues ★★★★★
Checkpoint.webp 2014-07-22 16:10:45 (Déjà vu) In 2014, No Country is Safe from Mobile Threats (lien direct) If you have been reading recent malware studies and articles, you may have noticed that many different different countries have been named as the ones “most targeted” or with the “most new mobile threats” ★★★
Checkpoint.webp 2014-07-19 21:48:50 (Déjà vu) Mobile Security Weekly – Applenterprise ? (lien direct) This week's news focuses on the business of mobile. Unlike most weeks, where we touch on a new strain of mobile malware or a new vulnerability - this week presents a different point of view on mobile security. It's critical to keep up to date with this sort of events, as in the long run they will undoubtedly impact all aspects of mobile security in the enterprise. ★★★★★
Checkpoint.webp 2014-07-12 22:41:57 Mobile Security Weekly – Have we seen the last of KNOX? (Update – 20th July) (lien direct) Android takes the lead in mobile security news this week. With major decisions being made regarding how Google views the future of Android security, they've received another big wakeup call - between 60-70% of Android devices are vulnerable to a substantial vulnerability. iOS users also discovered another blow to their security this week. Several months ago, our researchers at Lacoon Security discovered a vulnerability in the Gmail iOS app which enables a threat actor to perform a Man-in-the-Middle attack - and by doing so, view, and even modify, encrypted communications. Guideline ★★★★
Last update at: 2024-05-31 17:10:05
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter