Please turn on your JavaScript for this page to function normally.
biohazard
Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check …

LG HomeHack
Researchers turn LG’s Hom-Bot vacuum cleaner into a real-time spying device

Check Point researchers have discovered a vulnerability in LG’s smart home infrastructure that could have allowed hackers to take over the legitimate user’s account and, …

danger
Cybercriminals deploying assortment of banking Trojans and ransomware

Check Point revealed that banking trojans were extensively used by cybercriminals during August, with three variants appearing in the company’s latest Global Threat Impact …

Kodi
Why Kodi boxes can pose a serious malware threat

When new streaming devices, such as the Amazon Firestick and Apple TV, were first introduced, many were intrigued by the ease by which they could watch “over the …

firefighters
Fireball malware infected 250 million computers worldwide

Check Point researchers discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, named Fireball, takes …

Kodi
Hackers can use subtitles to take over millions of devices running VLC, Kodi, Popcorn Time and Stremio

Check Point researchers revealed a new attack vector threatening millions of users of popular media players, including VLC, Kodi (XBMC), Popcorn Time and Stremio. By crafting …

trojan
Dok Mac malware intercepts victims’ web traffic, installs backdoor

A new piece of Mac malware, more insidious and dangerous that all those encountered before, has been flung at European users via fake (but relatively convincing) emails. In …

WhatsApp Telegram
Vulnerability in WhatsApp and Telegram allowed complete account takeover

Check Point researchers today revealed a new vulnerability on WhatsApp and Telegram’s online platforms – WhatsApp Web & Telegram Web. By exploiting this vulnerability, …

Biohazard
Top five most wanted malware families worldwide

The Hancitor downloader has surged into the top five most wanted malware families worldwide for the first time, according to Check Point. The downloader, that installs …

Android malware
Android devices delivered to employees with pre-installed malware

A test of Android devices used in two unnamed companies revealed that 38 of them were infected with malware before being delivered to the employees. These were smartphones by …

shadow
Ransomware attacks growing rapidly, organizations are struggling

The percentage of ransomware attacks increased from 5.5%, to 10.5% of all recognized malware attacks from July to December 2016, according to Check Point. Check Point …

Android
Charger mobile ransomware steals contacts and SMS messages

Check Point’s mobile security researchers have discovered a new ransomware in Google Play, dubbed Charger. Charger was found embedded in an app called EnergyRescue. The …

Don't miss

Cybersecurity news