Check Point Software Technologies Ltd. is an Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security and security management.

Wikipedia
Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Every business has experienced at least one mobile cyberattack in the past year, according to a new study published today by Check Point mobile threat researchers. The report, entitled Mobile Cyberattacks Impact Every Business, is the first study to document the volume and impact of mobile attacks across corporate and public enterprise environments. The landmark […] The post New research: Mobile m...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • If there’s one thing we can count on it’s the tenacity and resourcefulness of cybercriminals. SandBlast Mobile threat researchers recently identified two new trends emerging in the global hacking community. First, cybercriminals have recently begun developing mobile permutations of existing zero-day malware. One recent case involved a mobile remote access Trojan (mRAT) that was spotted […] The pos...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form of malware during October as organizations were targeted with the CoinHive variant Crypto mining is emerging as a silent, yet significant, actor in the threat landscape, allowing threat actors to extract substantial profits while victims’ endpoints and networks suffer from […] The post October’s...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as pulling up an app on your phone. But beneath the surface of this always-on, seamlessly connected exterior, however, lie significant […] The post Check Point IoT Blog Series: ‘Home, Smart Home’ – But How Se...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Being “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the adoption of modern IT technology, it’s not surprising to see why today’s businesses are being pushed ever faster towards to […] The post Account Hijacks Affect Everybody, Even ‘Top Dogs’ appeared first on Che...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The smart home is often idealized as a domestic paradise — with a kitchen and fridge that can order groceries for you, robot vacuum cleaners, lights and heating you can control from your phone, and web-enabled entertainment in every room. Beneath the surface of this always-on, seamlessly connected image, however, lie significant concerns about privacy […] The post Check Point IoT Blog Series: ‘Hom...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The second season of award-winning TV thriller Mr. Robot premiered with a scene that sent shivers down the cybersecurity world’s spine. In uncomfortably realistic detail, hackers virtually broke into a smart home, turning the home-based IoT technology against its inhabitants. The TV and stereo started switching on and off randomly, the water temperature in the […] The post HomeHack: How Hackers Co...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
  • Check Point recently discovered a vulnerability in LG’s smart home infrastructure, which was named HomeHack, exposing it to critical user account takeover. If this vulnerability were to be exploited, an attacker would have been able to log into LG users’ accounts, select the devices connected to this account, and then remotely take control over them. HomeHack could allowed attackers to stop your r...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
  • Please subscribe, to learn more, visit: - pages.checkpoint.com/bad-rabbit-ransomware-attack.html A new ransomware attack called Bad Rabbit has struck organizations in Eastern Europe, and is now spreading to Turkey and Germany. Russian media outlets were among the first to report the ransomware, along with transportation systems in Ukraine. The malware is spread by a fake Flash update installer....

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • On October 14th, the Ukrainian Security Service warned that a new large scale cyber-attack, similar to notPetya, might take place sometime between October 13 and 17. The attack arrived a few days later than expected; today (October 24th, 2017) the anticipated ransomware attack broke in Europe. Ukraine was the main target for this malware, with […] The post Bad Rabbit – A New Ransomware Outbreak Ta...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • As mentioned in our previous blog post, the trend of online cryptocurrency mining is gaining momentum. The potential to mine cryptocurrency on anyone’s’ browser with ease and anonymity attracts website owners as well as threat actors — joining the fruitful mining pool of leading cryptocurrencies.   Machines all over the world mine cryptocurrencies and get […] The post Crypto Miners Part 2 appeared...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The Pirate Bay, the world’s largest BitTorrent indexer, is a massive online source for digital content– movies, games and software—and is among the top 100 most popular websites globally, according to Alexa. No stranger to controversy for its role in illegal downloads, a few weeks ago it was discovered that The Pirate Bay operators have […] The post Crypto Miners – The Silent CPU Killer of 2017 ap...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • A massive Botnet is forming to create a cyber-storm that could take down the internet. An estimated million organizations have already been infected. The Botnet is recruiting IoT devices such as IP Wireless Cameras to carry out the attack. New cyber-storm clouds are gathering. Check Point Researchers have discovered of a brand new Botnet evolving […] The post A New IoT Botnet Storm is Coming appea...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The Brazilian cyberspace is known to be a whole ecosystem of its own and, although the banking malware that originates there has traditionally been somewhat basic, recent trends have indicated new and more refined tools for attack. Subsequently, what originally started in Brazil may well be about to spread to users of online banking worldwide. […] The post Boleto: The Perfect ‘Inside Job’ Banking ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • This is the third post in our IoT blog series. Read the first post about IoT in healthcare and the second post about smart cities here. Driverless cars have long been a feature in science fiction – and over the past few years, they’ve become a reality, with the major motor manufacturers developing and showcasing autonomous vehicles, […] The post Baby, who can drive my car? appeared first on Check ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • A cybersecurity researcher of KU Leuven in Belgium, Mathy Vanhoef, has revealed a flaw in Wi-Fi’s WPA2’s cryptographic protocols. The discovery is alarming as the WPA2 protocol, the most common and secure Wi-Fi access protocol since 2004, is trusted by all for keeping Wi-Fi connections safe. The attack, known as a ‘KRACK Attack’ (Key Reinstallation […] The post KRACK Attack: How Secure is Your Wi-...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Check Point’s latest Global Threat Index has revealed a massive increase in worldwide Locky attacks during September, with the ransomware impacting 11.5% of organizations globally over the course of the month. Locky has not appeared in our Global Threat Impact Index, which reports on the top ten most prevalent malware attacks globally every month, since […] The post September’s Most Wanted Malware...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
  • More information: https://www.checkpoint.com/products-solutions/vsec-cloud-security/ Itai Greenberg, Head of Cloud Security at Check Point Software Technologies, describes how Check Point’s vSEC Cloud Security protects workloads in public clouds like AWS, private clouds like VMware SDDC ( using NSX ) and hybrid clouds built using the VMware Cloud on AWS solution. The VMware Cloud on AWS solution ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The second in our Check Point IoT series, read our first post about securing IoT devices in healthcare here.  The smart city is sparking the imagination of planners, developers, governments, businesses and citizens all over the world. Smart cities combine pervasive web connectivity, smart IoT devices, artificial intelligence and machine learning. They collect and analyze, […] The post Check Point ...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
  • Protecting Your Enterprise From Mobile Threats Worried about your Mobile Privacy? Secure your mobile phone now against mobile threats. Keeping your business safe from cyberattacks is no easy task, and the increased use of personal smartphones and tablets in the workplace has made it even harder. Cybertheives know your employees are often the weakest link in your organization's security. With a s...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.