Android phones in danger due to hackable Qualcomm chip
Qualcomm chips are present in more than 40 percent of the smartphones, and those chips have a major vulnerability that enables hackers to gain access to the smartphone. This is a significant threat to Android phones (Apple uses other chips) all over the world. Hackers can spy on smartphone users an... Read more
New variant Android ransomware claims to be from the FBI
A modified version of the Black Rose Lucy malware has surfaced on Android devices with the hackers impersonating the FBI. When affected users pay a fine, they supposedly could regain access to their encrypted files.
At the end of 2018, Check Point's security researchers identified a new variant ... Read more
Check Point acquires IoT security specialist Cymplify
Security company Check Point Software Technologies has acquired Cymplify for an unknown amount. Cymplify is a company that specialises in security for the Internet of Things (IoT).
Cymplify is developing a firmware analysis engine for IoT security that provides highly detailed cybersecurity pos... Read more
Security researcher installs ransomware on Canon camera
A security researcher from Check Point Software Technologies has demonstrated a technique that makes it possible to install ransomware on a Canon DSLR. The demonstration can be seen in a video.
The security researcher, Eyal Itkin, specifically infects a Canon EOS 80D.
In the digital camera there app... Read more
Agent Smith malware infects more than 25 million Android devices worldwide
Check Point security researchers have discovered a new malware called Agent Smith. The malware, disguised as a Google-related application, has infected more than 25 million devices worldwide, of which 15 million in India alone.
Agent Smith replaces automatically installed apps with malicious version... Read more
Check Point security analytics solution needs to discover more cloud threats
Check Point has launched a new tool that offers cloud-native threat protection and security intelligence. The tool, CloudGuard Log.oc, enables customers to view any data flow and audit trail in flexible, scalable cloud environments. The tool is designed to help customers better understand their clou... Read more
Scanning criminals for Bluekeep vulnerability in Windows
Hackers are actively looking for systems to exploit with the dangerous Bluekeep vulnerability within Windows. That leak allows the infection with a worm virus. More than one million systems worldwide seem vulnerable.
Criminals actively scan for computer systems that they can exploit with the Bluekee... Read more
Security researchers find 50 rogue apps in Google Play Store
Avast security researchers have found fifty rogue apps that passed Google's security checks and ended up in the Google Play Store. The apps have been installed millions of times on Android devices.
The apps are related to lifestyle services, writes ZDNet. They pretend to be legitimate software, but... Read more
Hackers out of 14-year-old Winrar vulnerability from
A last month discovered zero day leak in Winrar is meanwhile being exploited by hackers. This allows them to install malware unnoticed on systems with an old version of the software.
All versions of Winrar for Edition 5.70 contain a loophole that allows hackers to bypass Windows' built-in security a... Read more
Check Point discovered supply chain malware in Google Play Store
Researchers from security specialist Check Point have recently launched a new malware campaign that focuses on the Google Play Store. The so-called SimBad malware was found in no less than 206 applications and was downloaded a total of almost 150 million times. The malware now found is a classic exa... Read more