Search results for: Check+Point

  1. Check Point Software: The World's Leading Cyber Security for ...
    Stay one step ahead of threats with Check Point's industry leading cyber security
    products for threat prevention, mobile security, data centers, next-generation
    firewalls, and security management.
  1. FIREBALL - The Chinese Malware of 250 Million Computers Infected
    Jun 1, 2017 ... Check Point Threat Intelligence and research teams recently discovered a high
    volume Chinese threat operation which has infected over 250 million computers
    worldwide. The installed malware, Fireball, takes over target browsers and turns
    them into zombies. Fireball has two main functionalities: the ... ...
  1. ExpensiveWall: A dangerous 'packed' malware on Google Play
    Sep 14, 2017 ... Check Point's mobile threat research team identified a new variant of an Android
    malware that sends fraudulent premium SMS messages and charges users'
    accounts for fake services without their knowledge. According to Google Play
    data, the malware infected at least 50 apps and was downloaded ... ...
  1. The Judy Malware: Possibly the largest malware campaign found on ...
    May 25, 2017 ... Check Point researchers discovered another widespread malware campaign on
    Google Play, Google's official app store. The malware, dubbed “Judy”, is an auto-
    clicking adware which was found on 41 apps developed by a Korean company.
    The malware uses infected devices to generate large amounts ... ...
  1. Hacked in Translation - from Subtitles to Complete Takeover | Check ...
    May 23, 2017 ... Check Point researchers revealed a new attack vector which threatens millions of
    users worldwide – attack by subtitles. By crafting malicious subtitle files, which
    are then downloaded by a victim's media player, attackers can take complete
    control over any type of device via vulnerabilities found in many ...
  1. Check Point Discloses Vulnerability that Allowed Hackers to Take ...
    Check Point Discloses Vulnerability that Allowed Hackers to Take over Hundreds
    of Millions of WhatsApp & Telegram Accounts. by Eran Vaknin, Roman Zaikin
    and Dikla Barda, Check Point Research posted 2017/03/15. One of the most
    concerning revelations arising from the recent WikiLeaks publication is the
    possibility ... ...
  1. Preinstalled Malware Targeting Mobile Users | Check Point Blog
    Mar 10, 2017 ... Check Point mobile threat researchers recently detected a severe infection in 36
    Android devices belonging to a large telecommunications company and a
    multinational technology company. While this is not unusual, one detail of the
    attacks stands out. In all instances, the malware was not downloaded to ... ...
  1. Network Cloud Mobile Endpoint Security Products | Check Point ...
    Check Point provides organizations of all sizes with the latest data and network
    security protection in an integrated next generation firewall platform, reducing
    complexity and lowering the total cost of ownership. Whether you need next-
    generation security for your data center, enterprise, small business or home office
    , Check ...
  1. FalseGuide misleads users on GooglePlay | Check Point Blog
    Apr 24, 2017 ... Update: Since April 24, when the article below was first published, Check Point
    researchers learned that the FalseGuide attack is far more extensive than
    originally understood. Five additional apps containing the malware were found
    on Google Play, developed by “Анатолий Хмеленко.” The apps were ... ...
  1. Blog | Check Point Software
    It's one thing to discover a $10 note on the street, it's quite another to happen
    upon $3 million in a Monero crypto-currency wallet. The Check Point research
    team recently came across such a finding and traced it to what can safely be
    called one of the biggest malicious mining operations ever discovered. For the
    past 18 ...
Next 10