Sunday, April 14, 2024
No menu items!

check point

5 Gadgets Cybercriminals could Use to Spy on You

It is estimated that there are more 22 billion devices linked to a home internet connection around the world, and research suggests this figure could reach 38.6 billion by 2025. While hyper-connectivity offers countless benefits, it also increases the...

How COVID-19 could cause a Surge in QR Code Scams

The COVID-19 pandemic has forced organisations all over the world to rethink the way they interact with their consumers. For instance, restaurants have opted to use QR codes so that customers can browse menus on their phone or make...

A Cyber Pandemic May Be Next: How Secure are you in the Cloud?

The Coronavirus pandemic has influenced us in a more global way than the Cold War, affecting the environment, industry, finance, healthcare, leisure and almost every other human endeavour. Some of the areas of influence are clear and obvious. For example,...

Google and Amazon Revealed as Most Imitated Brands

It’s estimated that phishing is the starting point of over 90% of all attempted cyber-attacks, and Verizon’s 2019 Data Breach Investigations Report showed that nearly one-third (32%) of actual data breaches involved phishing activity. What’s more, phishing was present in 78%...

3 Things You Should Do if You Suspect Infected Apps On Your Android Device

A new variant of the Joker Dropper and Premium Dialer spyware has been discovered in the Google Play Store, according to researchers at Check Point. Joker, one of the most prominent types of malware for Android, keeps finding its way...

Inadequate Investment in Cybersecurity is Behind Increase in Cyber Attacks

Following on this week’s Life Healthcare cyberattack, the issue of cybersecurity has once again been brought to the fore as businesses and individuals are forced to evaluate whether measures in place are strong enough to withstand major breaches in...

5 Ways to Protect Your Business from Mobile Adware

One of the most common forms of cyberthreats designed to collect personal information from a user’s device is mobile adware. This is because roughly 4 billion people are connected to the Internet via their smartphone. Despite the adoption of mobile...

Check Point research finds security flaw in Android smartphones

A study conducted by Check Point has a security flaw in Samsung, Huawei, LG, Sony and other Android-based phones that leaves users vulnerable to advanced phishing attacks. The Threat Intelligence arm states that affected Android phones use over-the-air (OTA) provisioning,...

Meet Checkpoint’s new Regional Director for Africa

In August Check Point announced the appointment of Pankaj Bhula as the new Regional Director for Africa. With over 25 years' experience in the IT sector, Bhula is tasked with the responsibility of driving Check Point's market share and...

No environment is immune to cyber attacks-Check Point study reveals

The "Cyber Attack Trends: 2019 Mid-Year Report" conducted by CheckPoint provides a detailed overview of the cyber-threat landscape. According to the study, no environment is immune to cyber-attacks as cybercriminals continue to develop new toolsets and techniques, targeting corporate...
- Advertisement -spot_img

Latest News

How Are Smart Contracts Transforming Financial Transactions?

In the dynamic landscape of financial technology, smart contracts emerge as a transformative force. These self-executing contracts, with terms...
- Advertisement -spot_img