Tag: Check Point

Here you will find all the articles with the tag: Check Point.

Android phones in danger due to hackable Qualcomm chip

Android phones in danger due to hackable Qualcomm chip

Qualcomm chips are present in more than 40 percent of the smartphones, and those chips have a major vulnerability that enables hackers to gain access to the smartphone. This is a significant threat to Android phones (Apple uses other chips) all over the world. Hackers can spy on smartphone users an... Read more

date4 years ago
New variant Android ransomware claims to be from the FBI

New variant Android ransomware claims to be from the FBI

A modified version of the Black Rose Lucy malware has surfaced on Android devices with the hackers impersonating the FBI. When affected users pay a fine, they supposedly could regain access to their encrypted files. At the end of 2018, Check Point's security researchers identified a new variant ... Read more

date4 years ago
Check Point acquires IoT security specialist Cymplify

Check Point acquires IoT security specialist Cymplify

Security company Check Point Software Technologies has acquired Cymplify for an unknown amount. Cymplify is a company that specialises in security for the Internet of Things (IoT). Cymplify is developing a firmware analysis engine for IoT security that provides highly detailed cybersecurity pos... Read more

date4 years ago
Security researcher installs ransomware on Canon camera

Security researcher installs ransomware on Canon camera

A security researcher from Check Point Software Technologies has demonstrated a technique that makes it possible to install ransomware on a Canon DSLR. The demonstration can be seen in a video. The security researcher, Eyal Itkin, specifically infects a Canon EOS 80D. In the digital camera there app... Read more

date5 years ago
Scanning criminals for Bluekeep vulnerability in Windows

Scanning criminals for Bluekeep vulnerability in Windows

Hackers are actively looking for systems to exploit with the dangerous Bluekeep vulnerability within Windows. That leak allows the infection with a worm virus. More than one million systems worldwide seem vulnerable. Criminals actively scan for computer systems that they can exploit with the Bluekee... Read more

date5 years ago
Security researchers find 50 rogue apps in Google Play Store

Security researchers find 50 rogue apps in Google Play Store

Avast security researchers have found fifty rogue apps that passed Google's security checks and ended up in the Google Play Store. The apps have been installed millions of times on Android devices. The apps are related to lifestyle services, writes ZDNet. They pretend to be legitimate software, but... Read more

date5 years ago
Hackers out of 14-year-old Winrar vulnerability from

Hackers out of 14-year-old Winrar vulnerability from

A last month discovered zero day leak in Winrar is meanwhile being exploited by hackers. This allows them to install malware unnoticed on systems with an old version of the software. All versions of Winrar for Edition 5.70 contain a loophole that allows hackers to bypass Windows' built-in security a... Read more

date5 years ago
Check Point discovered supply chain malware in Google Play Store

Check Point discovered supply chain malware in Google Play Store

Researchers from security specialist Check Point have recently launched a new malware campaign that focuses on the Google Play Store. The so-called SimBad malware was found in no less than 206 applications and was downloaded a total of almost 150 million times. The malware now found is a classic exa... Read more

date5 years ago
1 2 3