MENU

Posts Tagged ‘check point’

  • No environment is immune to cyber attacks-Check Point study reveals

    No environment is immune to cyber attacks-Check Point study reveals

    July 29, 2019 • SecurityComments Off on No environment is immune to cyber attacks-Check Point study reveals

    The “Cyber Attack Trends: 2019 Mid-Year Report” conducted by CheckPoint provides a detailed overview of the cyber-threat landscape. According to the study, no environment is immune to cyber-attacks as cybercriminals continue to develop new...

  • Check Point discovers mobile malware disguised as Google related app

    Check Point discovers mobile malware disguised as Google related app

    July 22, 2019 • Mobile and Telecoms, SecurityComments Off on Check Point discovers mobile malware disguised as Google related app

    Check Point Researchers have discovered a new variant of mobile malware that is disguised as a Google-related application. The malware has according to Check Point infected around 25 million devices, with primary victims based in India. The core part of the...

  • Microsoft builds capacity of women software engineers in Kenya

    How to protect yourself from Windows vulnerability

    June 2, 2019 • Security, Top StoriesComments Off on How to protect yourself from Windows vulnerability

    In the last few days, Microsoft has released information about a critical vulnerability in the Windows operating system (CVE-2019-0708). This vulnerability allows remote code execution by an attacker directly from the network using the Remote Desktop Protocol...

  • data breach, GoT, Security, HBO

    Game of Thrones phishing scams and how to avoid them

    April 17, 2019 • Security, Top StoriesComments Off on Game of Thrones phishing scams and how to avoid them

    The long night has finally ended. Game of Thrones fans can finally come in from the cold and, like a starving dragon, start devouring the latest and final season of the massively popular TV show. But unlike the fantasy series, what is far more real is the...

  • Cyber incidents, major risks for financial services -study

    Cybercrime tools have become democratised reveals study

    February 15, 2019 • SecurityComments Off on Cybercrime tools have become democratised reveals study

    The second instalment of the 2019 Security Report by Check Point highlights how tools and services used to commit cyber-crime have become democratised, with advanced attack methods now available to anyone willing to pay for them, as part of the growing...

  • Vulnerabilities found in DJI Drone platform

    Vulnerabilities found in DJI Drone platform

    November 14, 2018 • Gadgets and Gaming, Security, Top StoriesComments Off on Vulnerabilities found in DJI Drone platform

    Check Point Software Technologies researchers outlined the process in which an attacker could have potentially gained access to a user’s account through a vulnerability discovered in the user identification process within DJI Forum, a DJI-sponsored...

  • Africa under siege by rising mobile threat, says Check Point

    Africa under siege by rising mobile threat, says Check Point

    October 1, 2018 • Security, West AfricaComments Off on Africa under siege by rising mobile threat, says Check Point

    Cyber-security solutions company, Check Point Software Technologies has recognised Africa as an important region for growth and investment, particularly as African countries are increasingly a choice target for cybercriminals. Even though the continent’s...

  • No environment is immune to cyber attacks-Check Point study reveals

    Check Point Software continues to invest and grow in Africa

    September 7, 2018 • East Africa, Security, Southern Africa, Top Stories, West AfricaComments Off on Check Point Software continues to invest and grow in Africa

    Check Point Software, a provider of cyber-security solutions globally, is bringing together top industry thought leaders at Check Point Experience (CPX) in Johannesburg today. As the African enterprises and governments are an increasing target for...

  • Research reveals how criminals target fax machines to take over networks and spread malware

    Criminals target fax machines to hijack networks and spread malware

    August 17, 2018 • Security, Top StoriesComments Off on Criminals target fax machines to hijack networks and spread malware

    New research from Check Point, a provider of cyber-security solutions globally, has shown how organisations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions...

  • What's really driving Africa's cyber-security workforce shortage?

    What’s really driving Africa’s cyber-security workforce shortage?

    July 9, 2018 • SecurityComments Off on What’s really driving Africa’s cyber-security workforce shortage?

    So many people have written so much about the ‘skills shortage’ from so many different angles. It’s a complex situation with several different layers, and there have been many initiatives that have aimed to address it. So why write yet...

  • No environment is immune to cyber attacks-Check Point study reveals

    Cyber-criminals exploiting World Cup Fever with wallchart phishing campaign

    June 27, 2018 • Security, Top StoriesComments Off on Cyber-criminals exploiting World Cup Fever with wallchart phishing campaign

    Check Point Software Technologies, a provider of cybersecurity solutions globally, has identified a phishing campaign linked to the start of the FIFA World Cup where cyber-criminals attempt to lure would-be victims into downloading a schedule of fixtures and...

  • 2019 cybercrime and financial trends

    A new malware is making its mark in Africa

    June 8, 2018 • East Africa, North Africa, Security, Southern Africa, West AfricaComments Off on A new malware is making its mark in Africa

    There’s a new cyber threat on the block, and it’s sneakier than anything we’ve seen before – undoubtedly the reason why it’s the malware of choice for hackers across Africa right now. In fact, though crypto-mining malware is...

  • ‘Most Wanted’ malware and vulnerabilities revealed

    May 5, 2018 • Security, Top StoriesComments Off on ‘Most Wanted’ malware and vulnerabilities revealed

    Check Point Software Technologies has published its latest Global Threat Index for the month of March, revealing a surge of cryptomining malware attacks, both globally and in South Africa. An endpoint cryptomining malware known as the XMRig variant has been...

  • ESET discovers vulnerability in a Cirque de Soleil mobile app

    Malware discovered in game apps on Google Play

    January 15, 2018 • Online & Social, Security, Top StoriesComments Off on Malware discovered in game apps on Google Play

    In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children. Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that...

  • For a lot of football teams taking part in the 21st edition of the World Cup, cybersecurity has become a real worry for their travelling parties.

    Top Cybersecurity Predictions for 2018

    December 20, 2017 • SecurityComments Off on Top Cybersecurity Predictions for 2018

    “The more things change, the more they stay the same.” Jean-Baptiste Alphonse Karr’s famous line resonated back in the 19th century Parisian literary circles, and it resonates today in the 21st century cybersecurity industry. With every new tool and...

  • 2018 is the 'Year of the Next-Gen cyberattack'-Carbon Black report

    A portrait of the current cyber-threat landscape

    December 7, 2017 • Security, Top StoriesComments Off on A portrait of the current cyber-threat landscape

    When you picture hackers, you conjure up an image of rebellious teenagers in hoodies, think again. Cybercrime is a great deal more organised than you might think and cybercriminals are increasingly developing business models of their own. In fact, certain...