Check Point: Emerging Mobile Threats, How to Prevent Them

Guest author: OLEG MOGILEVSKY, Product Marketing Manager, Threat Prevention, at Check Point Software Technologies It has…

Check Point Software’s Security Report Reveals Extent of Global Cyber Pandemic

New report shows how hackers and criminals exploited COVID-19 pandemic in 2020 to target all business…

Check Point Redefines Enterprise’s Secure Remote Access 

Acquisition of clientless, cloud-delivered secure remote access technology to integrate with Check Point’s Infinity architecture, making…

Check Point Research Finds Vulnerabilities in Amazon/Alexa Subdomains

Media Release:          SINGAPORE – ALEXA, hello!          Check Point…

Cyber Criminals ‘Join’ Race Towards Coronavirus Vaccine

Cyber criminals took advantage of the latest developments in the race to develop a vaccine, and…

Check Point’s 2020 Report on Cloud Security Identifies Misconfigurations and Other Leading Threats

Misconfigurations, unauthorised access and account hijacking named as leading threats in public clouds, while traditional security…

​Android Ransomware Fabricates FBI Notes — Check Point

​While browsing videos to watch on social media, a new variant of Russian malware tricks users…

Check Point Uncovers Tiktok Vulnerabilities, Now Patched

Check Point Research Reveals Multiple Vulnerabilities in TikTok Personal information such as private addresses and email…

Internet: From Securing Devices to Securing Nations

Here's a commentary on how Internet security has evolved over the years.

What You Should Know about Surveillance Attack on WhatsApp

Media Release: CYBERSECURITY companies Synopsys and Check Point have weighed in on the surveillance attack on…