Latest Entries »

Most of us who live in big cities are aware of the problems associated with big cities like polluted air, the gritty tap water, noise pollution, and so on. But we are not able to escape from all this for one reason or another. View full article »

WHEN YOU IMAGINE riding a Segway MiniPro electric scooter, your biggest concern is probably falling on your face. Much lower on that list? The notion that attackers could remotely hack your ride, make it stop short, or even drive you into traffic. Unfortunately, as one reacher found, they could have done just that. View full article »

RECALL YOUR FAVORITE memory: the big game you won; the moment you first saw your child’s face; the day you realized you had fallen in love. It’s not a single memory, though, is it? Reconstructing it, you remember the smells, the colors, the funny thing some other person said, and the way it all made you feel. View full article »

The news that disturbed my digital life came two years ago in a snail mail letter strewn with phrases like “malicious cyber intrusion” and “identity theft.” A relative’s company had been part of a massive hack, the note said, leaving my information exposed. Before the letter came, I was a cyber security neophyte: I didn’t use a VPN and encrypted websites were just for banking. I often shopped online, depositing my credit card number over coffee shop wifi. View full article »

Test injections from the NukeBot source code

This spring, the author of the NukeBot banking Trojan published the source code of his creation. He most probably did so to restore his reputation on a number of hacker forums: earlier, he had been promoting his development so aggressively and behaving so erratically that he was eventually suspected of being a scammer. Now, three months after the source code was published, we decided to have a look at what has changed in the banking malware landscape. View full article »

A breakdown of how pervasive the CopyCat malware campaign is

Check Point researchers identified a mobile malware that infected 14 million Android devices, rooting approximately 8 million of them, and earning the hackers behind the campaign approximately $1.5 million in fake ad revenues in two months. View full article »

Recently, Check Point researchers revealed a brand new attack vector – attack by subtitles. As discussed in the previous post and in our demo, we showed how attackers can use subtitles files to take over users’ machines, without being detected. View full article »

Check Point’s latest Global Threat Impact Index revealed that 28% of organizations globally were affected by the Roughted malvertising campaign during June. View full article »

Dam Breaking

A recent article in Information Age, titled “As the digital and physical worlds collide it’s time for a security refresh,” offers cybersecurity readiness advice from Mike East, CrowdStrike’s vice president for EMEA. The article, written by Nick Ismail, argues that as cyber threats continue to evolve, organizations must have the people, training and technology to respond in kind. View full article »

The information-stealing RETADUP worm that affected Israeli hospitals is actually just part of an attack that turned out to be bigger than we first thought—at least in terms of impact. It was accompanied by an even more dangerous threat: an Android malware that can take over the device. View full article »