What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Checkpoint.webp 2015-03-24 20:08:40 CuckooDroid – Fighting the Tide of Android Malware (lien direct) The future is mobile. Few experts doubt this conclusion these days. The accelerating proliferation of smartphones and other devices powered by the Android operating system throughout the world has created a corresponding increase in mobile apps – especially malicious mobile apps. This relatively new, but rapidly evolving, type of malware poses previously unseen dangers.   […] ★★★★★
Checkpoint.webp 2015-03-23 16:30:06 Go Atomic or Go Home (lien direct) Have you never heard the term 'Atomic Segment' used in security? Me neither. That is, until I came to Check Point. If you think about it, it makes a lot of sense. An atomic segment is a set of computing and networking elements that: (1) share a common security profile; (2) cannot further be subdivided […] ★★★★
Checkpoint.webp 2015-03-20 16:46:56 (Déjà vu) FREAK Lives On, Play Has Adware, iOS Brute-Force Attack – Mobile Security Weekly (lien direct) The post FREAK Lives On, Play Has Adware, iOS Brute-Force Attack – Mobile Security Weekly ★★★★
Checkpoint.webp 2015-03-19 17:23:12 Check Point Reveals New RCE Vulnerability in BitDefender Anti-Virus (lien direct) Check Point’s Malware and Vulnerability Research Group today revealed new research into potential attacks of a crucial component in the Windows operating system, and demonstrated the use of such an attack by revealing a previously unknown vulnerability in Bitdefender Anti-Virus.   The operating system component, known as NDIS, serves as the connecting layer between the […]
Checkpoint.webp 2015-03-13 14:49:17 Shiver Me Timbers! DDoS Attacks Caused by Pirate Bay Trackers and DNS Misconfigurations? (lien direct) In January of 2015 the Check Point Incident Response team (CPIR) had two DDoS attack cases from separate customers with similar characteristics: The first case: On Saturday January 10th a US Children's Hospital called the CPIR Emergency Hotline because they were suffering a DDoS attack.. After quick examination, the attack traffic was found to have […] ★★★★★
Checkpoint.webp 2015-03-12 20:28:54 Segmentation – the Simplest Security Policy Most People Miss (lien direct) In our 2014 Security Report, we highlighted a quote from Bill Cheswick, a world-renowned computer security expert, who in 1990 talked about first-generation network security focusing on perimeter protection. He called this simple perimeter security concept 'a sort of crunchy shell around a soft, chewy center.' The idea used to be that an organization's internal […] ★★★★★
Checkpoint.webp 2015-03-06 15:51:43 (Déjà vu) FREAK (Out!) Attack, Fake Amazon Voucher, Google Doesn\'t Encrypt – Mobile Security Weekly (lien direct) The post FREAK (Out!) Attack, Fake Amazon Voucher, Google Doesn’t Encrypt – Mobile Security Weekly ★★
Checkpoint.webp 2015-02-27 15:54:37 (Déjà vu) iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly (lien direct) The post iOS Crowned Insecure, Google Gets to Work, Budget Tablets Dangerous – Mobile Security Weekly ★★
Checkpoint.webp 2015-02-24 15:06:20 Is Software Defined Protection the New Software Defined Networking? (lien direct) Software Defined Networking (SDN) is the latest buzz term to take over the networking world – and is not to be overlooked. With the goal of automating network infrastructure functions that used to be fixed or manual, the aim is to take complex configuration tasks and make them programmable. When implemented correctly, it should make […]
Checkpoint.webp 2015-02-20 22:24:23 Angler Exploit Kit – Blocking Attacks Even Before Zero Day (lien direct) The Story Blocking attempts to use exploit kits (EK) against our customers is one of Check Point’s main targets in IPS. Thus, our Intelligence Teams follow closely the trends in this world. On late December, we noticed hype around a specific EK, namely, Angler EK, and decided to give high priority to writing an IPS […]
Checkpoint.webp 2015-02-19 22:22:22 Malware Analysis 101 (lien direct) Introduction A common misconception about malware is the great difficulty of performing malware analysis and the technical requirements involved. When many technical users are faced with a malware infection and asked to analyze it, they may think, “Hey, I’ve heard about this kind of malware. I’ve even read some malware reports, and they sound really […]
Checkpoint.webp 2015-02-19 20:45:14 Malware Analysis – CTB-Locker (lien direct) Executive Summary CTB (Curve-Tor-Bitcoin) Locker is a crypto-ransomware variant. It is based on advanced algorithms which are used in different combinations, making CTB-Locker significantly more difficult to detect and neutralize. CTB-Locker (aka Critroni or Onion) is based on a so-called encryptor, which encrypts all of a user's personal data and extorts payment to decrypt the […]
Checkpoint.webp 2015-02-19 12:51:46 Targeted Attacks on Enterprise Mobile Exposed in New Threat Research (lien direct) The post Targeted Attacks on Enterprise Mobile Exposed in New Threat Research
Checkpoint.webp 2015-02-13 16:42:30 (Déjà vu) New Android Trojans, Gremlins Inside Play, iPhone\'s Safe and Sound – Mobile Security Weekly (lien direct) The post New Android Trojans, Gremlins Inside Play, iPhone's Safe and Sound – Mobile Security Weekly ★★
Checkpoint.webp 2015-02-10 16:20:39 Demystifying iOS Enterprise Certificates (lien direct) The post Demystifying iOS Enterprise Certificates ★★★★★
Checkpoint.webp 2015-02-06 17:37:08 (Déjà vu) iOS Attacked (Again), Play\'s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly (lien direct) The post iOS Attacked (Again), Play’s Got Adware, Outlook Has Security Flaws – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-02-06 17:31:26 Your Malware Would Like To Phone a Friend (lien direct) The post Your Malware Would Like To Phone a Friend ★★★
Checkpoint.webp 2015-02-05 17:30:43 Clever and Persistent Android Banking Trojan Discovered (lien direct) The post Clever and Persistent Android Banking Trojan Discovered ★★★★★
Checkpoint.webp 2015-02-03 21:02:35 Cyberthieves Can Score a Data Touchdown with Unencrypted Apps (lien direct) The post Cyberthieves Can Score a Data Touchdown with Unencrypted Apps ★★★
Checkpoint.webp 2015-01-30 15:55:55 (Déjà vu) Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly (lien direct) The post Wi-Fi Direct Vulnerable, iOS Gets an Update, BlackPhone Gets Patched – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-01-26 20:52:08 Threat Advisory – CVE-2014-7911: A New Root Exploit for Android (lien direct) The post Threat Advisory – CVE-2014-7911: A New Root Exploit for Android ★★
Checkpoint.webp 2015-01-23 16:49:54 (Déjà vu) Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly (lien direct) The post Cyber Security Gets A Presidential Nod, Fast Tapping Unlocks LG G3, iOS 8 Adoption Slows – Mobile Security Weekly ★★
Checkpoint.webp 2015-01-20 18:58:29 Presto Change-o, Pixel Battery Saver Transforms into Potential Malware (lien direct) The post Presto Change-o, Pixel Battery Saver Transforms into Potential Malware ★★★★★
Checkpoint.webp 2015-01-16 15:05:13 (Déjà vu) Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly (lien direct) The post Google Cuts Android Security Updates, Apple iCloud Wants Your Biometrics – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-01-09 15:05:24 (Déjà vu) Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly (lien direct) The post Free Interview, Copied Fingerprints, and Super Cookies! – Mobile Security Weekly ★★★★★
Checkpoint.webp 2015-01-09 01:25:54 Diving into a Silverlight Exploit and Shellcode – Analysis and Techniques (lien direct) In recent years, exploit-kits have become one of the most common platforms for malware distribution. One of the exploits coming from Infinity exploit-kit exploits a security vulnerability in Microsoft Silverlight. Compared to other technologies like Java, PDF, Flash, etc. – Silverlight exploits are less common. Just to get a rough feeling, according to cvedetails.com, from […]
Checkpoint.webp 2014-12-31 16:47:54 Mobile Security 2014: The Year In Review (lien direct) The post Mobile Security 2014: The Year In Review
Checkpoint.webp 2014-12-27 03:42:17 Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping (lien direct) The post Mobile Security Weekly: SMS, Skype and Smartware Used For Snooping
Checkpoint.webp 2014-12-23 11:14:53 Your Website Should Reflect Your Brand – Not an Attacker\'s (lien direct) When IT professionals and business owners think about their security strategies, they often forget about one of the easiest assets for cyber criminals to attack: their websites. From consumer brands to small businesses to large enterprise companies, a website is the front-facing identity of any organization, and needs to be given the same security. iPage […]
Checkpoint.webp 2014-12-22 16:31:09 What Does Fast Threat Emulation Mean? (lien direct) Your IT department has probably deployed multiple kinds of defenses to protect your network from malware. We are all familiar with antivirus and intrusion prevention programs. They protect us from known threats and are our first line of protection defense. Known threats are characterized and stored in a threat database. The more we know, the […]
Checkpoint.webp 2014-12-19 22:10:57 (Déjà vu) Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware (lien direct) The post Mobile Security Weekly: Xsser Still a Threat, Apple Ups Touch ID Security, Chinese Manufacturer Preinstalls Malware
Checkpoint.webp 2014-12-18 18:40:41 (Déjà vu) Misfortune Cookie: The Hole in Your Internet Gateway (lien direct) What is the Misfortune Cookie vulnerability? Misfortune Cookie is a critical vulnerability that allows an intruder to remotely take over a residential gateway device and use it to attack the devices connected to it. Researchers from Check Point's Malware and Vulnerability Research Group recently uncovered this critical vulnerability present on millions of residential gateway (SOHO […]
Checkpoint.webp 2014-12-15 20:46:57 Mobile Security: Coming Soon To A Theater Near You (lien direct) The post Mobile Security: Coming Soon To A Theater Near You
Checkpoint.webp 2014-12-12 16:48:35 Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open (lien direct) The post Mobile Security Weekly: Inception Takes Hold, Attack Targets Sony, YikYak is Vulnerable, Apple Leaves Door Open
Checkpoint.webp 2014-12-10 16:52:25 Aren\'t All Security Threat Emulations the Same? (lien direct) You should be picky when selecting a security solution for your network. When it comes to comparing solutions, are there really any metrics other than speed and accuracy? Those are certainly two of the most important, but there are some other important features as well. Our top three would be: 1. Access to the largest […]
Checkpoint.webp 2014-12-09 17:00:13 How we Collect Infections by the Numbers? (lien direct) We have to admit there are advantages to being one of largest data security companies in the market. While our appliances and software blades are out protecting businesses around the globe, they are under attack all the time. Hackers have a lot of time on their hands and there is little downside for them to […]
Checkpoint.webp 2014-12-05 17:05:08 Sharing a Heritage of Innovation and “The Right Stuff” (lien direct) Last month, we introduced Capsule, a new way of securing your mobile environment and your critical documents. Today, we commend the United States and another capsule of innovation, the Orion. For those who missed the launch and landing, it brought to me the same thrill I felt as a kid, when I witnessed the Apollo […] Heritage
Checkpoint.webp 2014-12-05 16:42:16 (Déjà vu) Mobile Security Weekly: Uber\'s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again (lien direct) The post Mobile Security Weekly: Uber’s Literally Malware, WhatsApp Crashes Hard, iOS Jailbroken – Again Uber
Checkpoint.webp 2014-12-03 17:29:16 Let\'s Be Fair and Test Technology the Same Way We Use It. (lien direct) More than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once an email hits their inbox, it has been scanned and is safe to open. But is it? We created the […]
Checkpoint.webp 2014-12-01 17:31:54 (Déjà vu) Man in the Binder: He Who Controls the IPC Controls the Droid (lien direct) At Black Hat Europe, Check Point researchers Nitay Artenstein and Idan Revivo presented their new research on what may become the new frontier of mobile malware attacks, “Man in the Binder: He Who Controls the IPC, Controls the Droid.” Nitay and Idan's research of Android's unique operating system (OS) architecture showed the potential capture of […]
Checkpoint.webp 2014-11-28 16:47:58 Mobile Security Weekly: Black Friday Security Threats, On Sale Now! (lien direct) The post Mobile Security Weekly: Black Friday Security Threats, On Sale Now!
Checkpoint.webp 2014-11-25 16:04:29 Has Your Android Device Been Fakedebuggered? (lien direct) The post Has Your Android Device Been Fakedebuggered?
Checkpoint.webp 2014-11-21 19:21:32 (Déjà vu) Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy (lien direct) The post Mobile Security Weekly: Android mRATs, Paid Apps Hacked, Whatsapp Talks Privacy
Checkpoint.webp 2014-11-21 16:39:53 A Look Ahead: Mobile Security Predictions for 2015 (lien direct) The post A Look Ahead: Mobile Security Predictions for 2015
Checkpoint.webp 2014-11-20 17:34:49 New Miercom Report on Zero Day and APT Malware Catch Rates – Check Point Outperforms the Competition (lien direct) If you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the performance of five security products. They specifically focused on products claiming superior performance for Advanced Threat Detection to determine the […] Guideline
Checkpoint.webp 2014-11-20 17:21:47 A Billion Android Devices Exposed - Are you at risk? (lien direct) The post A Billion Android Devices Exposed — Are you at risk?
Checkpoint.webp 2014-11-18 01:29:25 Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach? (lien direct) The post Cyberthieves Move Beyond Jailbreak – Is Your Enterprise at Risk of a Breach?
Checkpoint.webp 2014-11-14 16:45:56 Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up (lien direct) The post Mobile Security Weekly: Behind Masque Attack, Russian Worm Spreading, BlackBerry & Samsung Team Up
Checkpoint.webp 2014-11-12 08:15:47 When it Comes to Security, What is Good Enough? (lien direct) Ben Franklin once said that an ounce of prevention is better than a pound of cure. We couldn't agree more when it comes to network security. From both time and financial standpoints, it is much more cost effective to prevent infections than deal with their aftermath. Infection cleanup is very costly to businesses. The latest […]
Checkpoint.webp 2014-11-10 17:45:06 (Déjà vu) Immobilize WireLurker Before It Immobilizes You (lien direct) A recent malware, “WireLurker”, affects Apple OS X and iOS. As highlighted in the recent announcement by Check Point on mobile security, the amount of mobile malware is on the rise. In this case, WireLurker affects both desktop and mobile platforms. The infection starts through trojanized and repackaged OS X applications. It then transfers to […]
Last update at: 2024-05-15 10:10:25
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter