What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2016-10-18 11:02:19 Outstanding Results – Check Point Achieves 3rd NSS Recommended Rating This Year (lien direct) Great news! I'm glad to report we achieved another NSS Recommended in their recent NGIPS Group Test! This is our 3rd NSS Recommended this year and our 13th since we began working with NSS Labs in 2011. The previous two tests this year measured our Next Generation Firewall capabilities and the Breach Detection System (advanced […]
Checkpoint.webp 2016-10-14 18:39:17 Join Check Point at SecTor to learn how to go beyond traditional security with advanced threat prevention (lien direct) Next week, Check Point will be at SecTor, Canada's premier IT security education conference. The conference brings the world's brightest (and darkest) minds together to identify, discuss, dissect and debate the latest digital threats facing corporations today. The conference has assembled a line-up of industry experts who will share some of the most engaging, educational […]
Checkpoint.webp 2016-10-14 17:53:38 Android Updates: Hurry Up and Wait   (lien direct) Google, device makers and carriers take too long to update Android vulnerabilities. In fact, while it takes Apple just days to update iOS when it finds a vulnerability, Threatpost points out that it can take Google weeks or even months to do the same for Android. Apple needed only ten days to fix Trident vulnerabilities in iOS, but it took Google […]
Checkpoint.webp 2016-10-12 17:11:01 4 Tips on How to Respond to a Ransomware Attack (lien direct) Benjamin Franklin said, “An ounce of prevention is worth a pound of cure.” In the world of cyber security, it is indeed essential that organizations take steps to prevent ransomware from attacking their organizations and taking their data hostage. However, despite even the most extravagant and precautious preparations, some attacks may still get through. Knowing […]
Checkpoint.webp 2016-10-07 13:00:59 Defeating Sandbox Evasion: How to Increase Successful Emulation Rate in Your Virtualized Environment (lien direct) At the Virus Bulletin conference yesterday in Denver, Check Point researchers Stanislav Skuratovich and Aliaksandr Chailytko gave a talk detailing how cyber security professionals can defeat sandbox evasion. In case you weren’t able to attend the conference, we’ve provided a summary of their presentation below. The malware world is a dynamic one. As soon as sandboxes appeared, […]
Checkpoint.webp 2016-10-06 18:57:59 5 Tips to Fight Back Against Ransomware (lien direct) Did you know that October is National Cyber Security Awareness Month (NCSAM), both in the United States and Europe? What is it, you ask? NCSAM is a public awareness campaign that inspires businesses and individuals to take proactive measures to protect themselves from cyber threats. As the largest network cyber security vendor globally, Check Point […]
Checkpoint.webp 2016-10-06 13:00:17 Great Crypto Failures – When Malware Goes Wrong (lien direct) Yesterday at the Virus Bulletin conference in Denver, Check Point researchers Yaniv Balmas and Ben Herzog presented “Great Crypto Failures”, a lecture about the cryptography mishaps made by cyber criminals. Cryptography is a major part of many malware functionalities today. It's used to disguise malware, allow it to bypass security measures, create a communication channel […]
Checkpoint.webp 2016-10-05 17:16:32 The Cloud: Rethinking IT Security Roles (lien direct) Whether you lead a team of IT professionals-or are the team-tasks like swapping power supplies and tinkering with the datacenter's air conditioning are quickly transitioning to people in cloud-computing centers. Cisco estimates 83 percent of data center traffic will become cloud traffic by 2019.[i] Moving to the cloud is a significant change from static hardware-based […] Guideline
Checkpoint.webp 2016-09-29 13:00:06 Antivirus Isn\'t Dead, But It\'s No Panacea (lien direct) It should come as no surprise that antivirus solutions on their own are not equipped to deal with many of the threats we see today. Norton Antivirus stated as much back in 2014 when it famously declared, “Antivirus is dead.” The claim was not an indication that such products would be discontinued, but more an […]
Checkpoint.webp 2016-09-28 13:00:32 Ransomware: Steal Smarter, Not Harder (lien direct) Occasionally, even cybercriminals must revamp their “product lines.” They do this when their bread-and-butter malware stops making money due to new security measures, or if they invent a better way to rip people off. Check Point security researchers have caught criminals in the act ramping up ransomware attacks while scaling back banking Trojans. We believe […]
Checkpoint.webp 2016-09-27 16:51:52 Signature-based security solutions can leave networks defenseless for months (lien direct) Can you afford five months without protection for your network? In a recent blog post, Avanan wrote that after five months of using a malware sample in their demos to show how malware can bypass traditional security solutions the malware was finally detected by a major enterprise email solution provider. The sample, a Cerber variant, […]
Checkpoint.webp 2016-09-22 17:50:07 Gartner Recognizes the Importance of Mobile Threat Defense (lien direct) HummingBad. Stagefright. QuadRooter. Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data. We believe this trend – one that our research team encounters daily – is illustrated in the Gartner Market Guide for Mobile Threat Defense Solutions.* […]
Checkpoint.webp 2016-09-21 22:42:16 (Déjà vu) On Their Best Behavior: Securing iOS and Android in the Enterprise (lien direct) In today's business environment, using mobile devices isn't just a business requirement, it's an employee expectation. But for some organizations, these devices present security challenges that prevent or limit their ability to support a fully mobile enterprise. It's not enough that they just deploy or manage iOS and Android devices, they also need to defend […]
Checkpoint.webp 2016-09-20 14:00:51 Will your virtual data traffic take the detour around firewalls? (lien direct) We're going to need a new term to talk about “data centers.” I say this because virtualization in public and private form factors means the locations of processors and other resources you use on-demand don't sit statically in a data center anymore. Virtual resources dart around like bees in a field of clover. When will […]
Checkpoint.webp 2016-09-19 13:00:32 August\'s Top 10 Most Wanted Malware (lien direct) Today, Check Point revealed that both the number of variants of ransomware and volume of malware attacks were on the rise in August, as the company disclosed the most prevalent malware families attacking organizations' networks in the period. During August, the number of active ransomware families grew by 12 percent while the number of detected […]
Checkpoint.webp 2016-09-16 14:00:41 In The Wild: App Stores Are No Sanctuary for Mobile Malware (lien direct) Most mobile users rely on Google Play and the Apple App Store for their safety and assume that by downloading only highly-rated apps from these stores keeps them safe from mobile malware. In the past, this might have been a good strategy, but today it doesn't always work. Breaking the Myth: Google Play The Check […]
Checkpoint.webp 2016-09-09 22:16:26 (Ir)responsible Disclosure (lien direct) Computers have become an essential part of our lives, and in some cases, they are even responsible for keeping us alive. Our dependency to use computers for medical treatments such as diagnostic equipment, medical monitors and even life support is greater than ever. Technology has given the medical sector new and inspirational ways to continue […]
Checkpoint.webp 2016-09-08 17:30:29 CallJam Android Malware Found on Google Play (lien direct) Keeping Android smartphones and tablets safe from malicious apps is a constant battle for enterprises, end users, and for Google. Despite Google's efforts to prevent cybercriminals from infiltrating Google Play, the Check Point mobile research team has discovered new Android malware there it calls CallJam. CallJam malware includes a premium dialer to generate fraudulent phone […]
Checkpoint.webp 2016-09-08 17:00:56 Life After QuadRooter: Measuring The Impact (lien direct) Following Check Point's disclosure of QuadRooter at Black Hat USA on August 7, the free QuadRooter scanner app was downloaded over half a million times. The results of the scans Check Point collected show that almost two thirds of scanned devices were affected. These reports also offer a unique opportunity to analyze a large sample […]
Checkpoint.webp 2016-09-08 13:00:58 Pixel Tracking: A Hacker\'s Tool (lien direct) What is pixel tracking? It's challenging to justify the effectiveness of an email campaign if you can't measure its success. So, what do you do? You use pixel tracking, a seemingly innocent sales tool that helps sales and marketing teams track their campaigns. Tracking pixels are embedded into emails and load when the recipient opens […]
Checkpoint.webp 2016-09-07 22:58:22 Email from PayPal? Don\'t Get Attached! (lien direct) Introduction Phishing scams are fraudulent email messages that appear to come from legitimate enterprises such as your university, your Internet service provider, or your bank. These messages usually direct you to a spoofed website, have a malicious attachment, or otherwise get you to divulge private information. The perpetrators then use this information to commit identity theft. […]
Checkpoint.webp 2016-09-07 13:00:06 Closing the Cloud Security Gaps (lien direct) Regardless of where your applications and data reside – whether in private, public or hybrid cloud environments – they are attractive targets. Protecting assets in the cloud requires the same comprehensive security used to protect your physical environments. However, the dynamic and elastic nature of the cloud make traditional security approaches ineffective, exposing organizations and […]
Checkpoint.webp 2016-09-01 17:15:51 Check Point Forensics: PokemonGo Ransomware\'s Hidden Unexpected User (lien direct) It was inevitable. Given the popularity of PokemonGo, ransomware developers have already attempted to trick users into downloading malware that claims to be PC versions of the popular mobile game. There are currently already two known ransomware variants that attempt to capitalize on the mobile games popularity by naming their executables pokemongo.exe. BleepingComputer has already […]
Checkpoint.webp 2016-08-31 19:15:00 DressCode Android Malware Discovered on Google Play (lien direct) The Check Point mobile threat prevention research team discovered a new Android malware on Google Play, called “DressCode,” which was embedded into more than 40 apps, and found in more than 400 additional apps on third party app stores. Check Point notified Google about the malicious apps, and some have already been removed from Google […]
Checkpoint.webp 2016-08-31 15:42:18 Check Point Spearheads Threat Prevention Security for Small and Medium Businesses (lien direct) Small and medium-sized business owners typically think the security that protects their large enterprises counterparts is well out of reach in terms of costs and complexities. However recent shifts in the threat landscape have them rethinking their security strategies. Cybercriminals are equal opportunists who leverage the same tactics used on bigger enterprises to target smaller […]
Checkpoint.webp 2016-08-30 21:08:08 Whaling: The Hunt for High Profile Business Targets (lien direct) What are whaling attacks? “Whaling” attacks, also called Business Email Compromise (BEC), are a newer form of phishing attack. Phishing attacks consist of messages sent to would-be victims that try to deceive them into clicking malicious links, or opening an attachment that contains malware. Phishing attacks have evolved drastically, in part due to growing awareness […]
Checkpoint.webp 2016-08-29 07:01:40 Beware of the Trident Exploits (lien direct) Researchers from The Citizen Lab at the University of Toronto last week revealed a sophisticated zero-day attack on the iPhone of Ahmed Mansoor, a human rights activist in the United Arab Emirates. The Citizen Lab discovery exposed three zero-day exploits used by “Pegasus,” a lawful interception cyberespionage tool developed by the Israeli-based NSO Group and […]
Checkpoint.webp 2016-08-26 13:00:42 Web Scripting Language PHP-7 Vulnerable to Remote Exploits (lien direct) Exploiting server side bugs is a jackpot for hackers. Users tend to keep their data in one big pot – the server. This allows attackers to focus on one target, instead of individual users, making it possible for them to achieve greater results. This approach has been extremely profitable for attackers with various goals ranging […]
Checkpoint.webp 2016-08-25 22:26:03 Advancing the Security of Your SDDC (lien direct) VMworld US is rapidly approaching and we've been busy gearing up for a great show! In fact, the product team has been especially busy building new features and capabilities into our vSEC Cloud Security product portfolio which we'll showcase during VMworld. While businesses of all sizes are making significant strides to virtualize networks and leverage […]
Checkpoint.webp 2016-08-24 17:00:07 The QuadRooter Domino Effect (lien direct) Component suppliers, Android device manufacturers and developers all test their products rigorously. Even still, vulnerabilities — both in hardware and software — can be found on the smartphones and tablets we trust with our sensitive data. Until a patch for a vulnerability is installed, an affected device is exposed. That’s why fixing vulnerabilities like QuadRooter […]
Checkpoint.webp 2016-08-24 13:00:44 The Evolution of Proxy (lien direct) When I entered the security market nearly 20 years ago, the philosophical and almost religious debate was whether proxy was a better technology than stateful inspection. Back then stateful firewalls were all about access control and proxy servers were interrupting a web connection to prevent direct internet exposure, and the “smart” ones were able to […]
Checkpoint.webp 2016-08-23 17:44:30 Phishing scams target everyone – even us! (lien direct) Phishing scams have been around for over twenty years. It appears unlikely that they will ever go away. Targeting anyone with an email address, they continue to be a persistent threat. Recently, even some of Check Point's executives were recently targeted. The below email, purportedly from PayPal, is an example of emails that potential victims […]
Checkpoint.webp 2016-08-22 19:05:59 Check Point Forensic Files: Proving Ranscam ransomware does not provide a way to recover files (lien direct) Every week we see new ransomware variants as cyber criminals continue to generate revenue from holding victims’ files for ransom. In July, a new ransomware was discovered that is an out-and-out scam. It does not encrypt any files; it simply deletes all user files. It then demands a ransom for recovery of the files, but […]
Checkpoint.webp 2016-08-18 13:00:21 July\'s Top 10 Most Wanted Malware (lien direct) Check Point Software Technologies today revealed the number of active malware families decreased by 5 percent in July, as the company disclosed the most prevalent malware families attacking organizations' networks in the month. During July, Check Point detected 2,300 unique and active malware families attacking business networks, a 5 percent increase compared to June, with […]
Checkpoint.webp 2016-08-16 13:00:25 CerberRing: An In-Depth Exposé on Cerber Ransomware-as-a-Service (lien direct) Check Point researchers have uncovered the sophisticated infrastructure of Cerber, a Ransomware-as-a-Service, including the business model and money trail. For the full CerberRing Report click here. The ransomware epidemic continues to rage on, encrypting files of private and enterprise users alike. Ransomware has become a global problem. According to the FBI, the accumulated revenue in the […]
Checkpoint.webp 2016-08-07 20:53:21 QuadRooter: New Android Vulnerabilities in Over 900 Million Devices (lien direct) Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities QuadRooter, presented its findings in a session at DEF CON 24 in Las Vegas. What is QuadRooter? QuadRooter is a […]
Checkpoint.webp 2016-08-02 13:00:50 SandBlast Receives ‘Recommended’ Rating Once Again (lien direct) Hackers continue to target organizations with advanced malware. With over 390,000 new malware variants created each day1, traditional security solutions don't stand a chance in this cat and mouse game. Organizations are constantly striving to ensure protections are top notch to defend their organizations against ever-persistent cyber attackers. An essential ingredient to successfully block unknown […]
Checkpoint.webp 2016-08-02 13:00:18 Secure Every Click – Check Point SandBlast™ Agent for Browsers (lien direct) Internet users expect near-instant and unconstrained access to web content when browsing. Unfortunately, the web poses one of the greatest threats to enterprises today. Malware may be hidden in web-downloaded content or webmail attachments. Your employees may unknowingly become victims of phishing, social engineering, and other malware-less attacks aimed at stealing corporate passwords and sensitive […]
Checkpoint.webp 2016-07-26 13:00:42 Ransomware: what you need to know (lien direct) In recent years, there has been a surge of ransomware attacks. It's been reported all over security blogs, tech websites and in the news. Unfortunately, these attacks show no signs of slowing. If anything, they are getting worse. Cryptolocker, the first famous ransomware, was observed in the wild in 2013. From then until mid-2015, there […]
Checkpoint.webp 2016-07-22 14:00:51 Securely Embrace the Hybrid Cloud (lien direct) The trend in enterprise IT is to move from a hardware-centric to an application-centric network model, enabling businesses to streamline processes and improve end-user experiences, all while enhancing their competitive positioning. As a result, IT organizations are under tremendous pressure to rapidly transform in order to keep pace with these new business demands. This need […]
Checkpoint.webp 2016-07-21 20:00:34 The Cure for Your Private Cloud Security Blues (lien direct) Hot off the heels of Cisco Live! in Las Vegas, there's a continued buzz about the Cisco Application Centric Infrastructure (ACI) and how it is helping organizations transform from legacy to next-generation private cloud data centers. In fact, front-and-center to this year's event was the desire to transform Cisco offerings and make them more cloud-like, […]
Checkpoint.webp 2016-07-20 16:36:37 Check Point Forensics: CTB-Faker Ransomware (lien direct) SandBlast Agent Forensics Introduction The concept is quite simple: we run a malware sample on a PC in our malware lab, with all protections turned off, and let SandBlast Forensics automatically analyze it, providing comprehensive analysis of the security incident. In addition to the blog, we are thrilled to now provide you with access to […]
Checkpoint.webp 2016-07-18 18:00:37 (Déjà vu) Top 10 Most Wanted Malware (lien direct) Check Point Software Technologies today published its latest Threat Index, revealing the number of active malware families increased by nearly two-thirds in the first half of 2016, led by the number of threats to business networks and mobile devices. During June, Check Point detected 2,420 unique and active malware families attacking business networks, a 61 […]
Checkpoint.webp 2016-07-14 13:00:35 Ransomware’s Motto: The Simpler, The Scarier, The Better (lien direct) A lot has been said about the ransomware epidemic. The number of infections worldwide increases daily, as well as the number of different variants. Check Point researchers have been analyzing ransomware for almost two years, and it has been a fascinating study. We can easily follow the trends, common aspects, and differences between ransomware families. […]
Checkpoint.webp 2016-07-13 15:48:52 Stop Before You (Pokemon) GO (lien direct) The excitement over the new game Pokemon GO has taken the world by storm. Because it’s available only in limited countries right now, some people may be tempted to download the app from sources other than Google Play or the Apple App Store. Getting apps from unofficial sources can expose you to malicious apps that […]
Checkpoint.webp 2016-07-11 13:00:21 Malware\'s Constant Evolution Requires Advanced Protections (lien direct) Malware developers are fast learners. They adapt to new security measures in record time and find new ways to evade detection or at least stay hidden long enough to complete their malicious goals. In this blog we review some of the cutting-edge techniques attackers use to bypass defenses and the techniques we use to protect […]
Checkpoint.webp 2016-07-11 09:13:18 (Déjà vu) DIY Attribution, Classification, and In-depth Analysis of Mobile Malware (lien direct) The security research community has been dealing with malware attribution and classification for decades. The benefits of this process for PC-based malware are myriad and well known. Check Point has followed the same process for multiple malware campaigns during the last year, including Volatile Cedar, Rocket-Kitten, and the Nuclear Exploit Kit. In fact, the PC […]
Checkpoint.webp 2016-07-08 22:41:38 Jigsaw Ransomware Decryption (lien direct)   The Jigsaw ransomware was first spotted in April 2016, and has since received a bit of traction. It became infamous thanks to an image of the Jigsaw killer from the movie 'Saw' displayed on the ransom note (hence its name), and its unique way of persuading victims to comply – if payments aren't made […]
Checkpoint.webp 2016-07-05 18:53:12 Check Point Forensic Files: Cerber Ransomware Distribution using Office DOTM files (lien direct) The start of a series This blog entry is the first in a new series featuring reports from Check Point SandBlast Agent Forensics. The concept is quite simple: we run a malware sample on a PC in our malware lab, with all protections turned off, and let SandBlast Forensics automatically analyze it. SandBlast Forensics identifies, […]
Checkpoint.webp 2016-07-01 17:20:07 From HummingBad to Worse: New In-Depth Details and Analysis of the HummingBad Android Malware Campaign (lien direct) For five months, Check Point mobile threat researchers had unprecedented access to the inner-workings of Yingmob, a group of Chinese cyber criminals behind the HummingBad malware campaign. HummingBad is a malware Check Point discovered in February 2016 that establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional fraudulent apps. Yingmob […]
Last update at: 2024-05-20 14:19:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter