Friday, June 13, 2025
No menu items!

Check Point Research

Fake COVID-19 Vaccination Certificates for Sale on the Dark Net

While the global roll-out of COVID-19 vaccinations continues to accelerate, it’s worth remembering that only around 1% of the world’s population have received their full course of injections. Billions are still waiting for their first dose, which inevitably leads...

5 Gadgets Cybercriminals could Use to Spy on You

It is estimated that there are more 22 billion devices linked to a home internet connection around the world, and research suggests this figure could reach 38.6 billion by 2025. While hyper-connectivity offers countless benefits, it also increases the...

How COVID-19 could cause a Surge in QR Code Scams

The COVID-19 pandemic has forced organisations all over the world to rethink the way they interact with their consumers. For instance, restaurants have opted to use QR codes so that customers can browse menus on their phone or make...

7 Cybersecurity Predictions for 2021

COVID-19 will continue to be a key focus for organizations’ IT and security teams, says cybersecurity solutions company Check Point. “The pandemic derailed business-as-usual for virtually every organization, forcing them to set aside their existing business and strategic plans, and...

A Cyber Pandemic May Be Next: How Secure are you in the Cloud?

The Coronavirus pandemic has influenced us in a more global way than the Cold War, affecting the environment, industry, finance, healthcare, leisure and almost every other human endeavour. Some of the areas of influence are clear and obvious. For example,...

3 Things You Should Do if You Suspect Infected Apps On Your Android Device

A new variant of the Joker Dropper and Premium Dialer spyware has been discovered in the Google Play Store, according to researchers at Check Point. Joker, one of the most prominent types of malware for Android, keeps finding its way...

Inadequate Investment in Cybersecurity is Behind Increase in Cyber Attacks

Following on this week’s Life Healthcare cyberattack, the issue of cybersecurity has once again been brought to the fore as businesses and individuals are forced to evaluate whether measures in place are strong enough to withstand major breaches in...

Check Point Software Partners Strathmore University to Promote Digital Skills in Kenya

Cybersecurity solutions company, Check Point Software has announced that its education initiative has partnered with Strathmore University in Kenya to provide a comprehensive cybersecurity curriculum to students, bridging the digital skills gap and also creating a safer local cyber...

5 Ways to Protect Your Business from Mobile Adware

One of the most common forms of cyberthreats designed to collect personal information from a user’s device is mobile adware. This is because roughly 4 billion people are connected to the Internet via their smartphone. Despite the adoption of mobile...

Top 10 Most Imitated Brands by Cybercriminals

When it comes to phishing attacks, cybercriminals often try to imitate the official website of a well-known brand - they do this by using a similar domain name or URL and web-page design to the genuine site. The link to...
- Advertisement -spot_img

Latest News

Google DeepMind & Research Introduce New Advancement in AI for Weather Forecasting

Google DeepMind and Google Research have unveiled a suite of new tools designed to improve the prediction of tropical...
- Advertisement -spot_img