Home » check point

check point

Researchers find security flaw in Rarible: Users could have lost all their NFTs

The research arm of cyber security software firm Check Point said it identified a vulnerability in the Rarible NFT marketplace that could have seen many of its roughly two million active monthly users lose their NFTs in a single transaction. Check Point is a multinational IT security firm that was founded in Ramat Gan, Israel in 1993 and also claimed to have spotted issues relating to malicious airdrops on OpenSea back in October 2021. According to documents shared with Cointelegraph, Check Point Research (CPR) recently discovered that malicious actors could send users a dubious link to an NFT that executes JavaScript code after clicking that “attempts to send a setApprovalForAll request to the victim.” If the link is clicked, the user grants full access to their wallets on Rarible. CPR st...

Abia: Police go unconventional, places juju in front of station

The Nigerian police in Abia have adopted unconventional method of fighting crime by placing a deity-like juju on a check point in Umuahia, the state capital. The object was placed on St. Finbarr’s/Bende Roads Junction adjacent the Central Police Station (CPS), Umuahia. When newsmen visited the area, a policeman was seen posing with the juju as other policemen armed to the teeth were seen stationed strategically around the junction. Investigations revealed that unknown gunmen who of late have been burning police formations and killing policemen were reported to be wearing juju brackets ‘Odeshi’ on their waist which allegedly prevent bullets from piercing their bodies. It was perhaps to neutralize the perceived efficacy of the unknown gunmen odeshi that made the police to adopt theirs. A pol...

5 House Objects Cybercriminals could Use to Spy on You

It is estimated that there are more 22 billion devices linked to a home internet connection around the world, and research suggests this figure could reach 38.6 billion by 2025. While hyper-connectivity offers countless benefits, it also increases the number of available attack points to hackers and invisible intruders. Check Point research warns that there are five household objects that are being targeted by cybercriminals to spy on individuals in their own home. “Mobile phones, Smart TVs, computers and toys are just some of the devices being targeted. The number of products that feature a camera or microphone is growing every day, which can become an issue if they are connected to the internet and do not have the necessary security measures in place,” says Eusebio Nieva, Technical Direc...

How COVID-19 could cause a Surge in QR Code Scams

Sourced from Forbes The COVID-19 pandemic has forced organisations all over the world to rethink the way they interact with their consumers. For instance, restaurants have opted to use QR codes so that customers can browse menus on their phone or make contactless payments without risking possible transmission. And now, Check Point is warning mobile users of the security risks of QR codes. The cybersecurity solutions company says that hackers are looking to take advantage of QR codes’ new popularity, by replacing legitimate QR codes with one that launches a malicious URL or tries to download customized malware. A recent survey by MobileIron showed that from March to September 2020, 38% of respondents scanned a QR code at a restaurant, bar or café, and 37% scanned a code at a retailer. Over ...

A Cyber Pandemic May Be Next: How Secure are you in the Cloud?

The Coronavirus pandemic has influenced us in a more global way than the Cold War, affecting the environment, industry, finance, healthcare, leisure and almost every other human endeavour. Some of the areas of influence are clear and obvious. For example, the acceleration of digital transformation, which changes how organisations operate and provide value to their customers. There is also an increased demand for cloud computing, which provides most of the foundations, tools and infrastructure to fuel the digital transformation. Some world leaders in the cybersecurity space, including the World Economic Forum, predict that this rapid and unplanned move will result in a cyber-pandemic down the road – more on that later. This acceleration in digital transformation and demand for clo...

3 Things You Should Do if You Suspect Infected Apps On Your Android Device

Sourced from Forbes A new variant of the Joker Dropper and Premium Dialer spyware has been discovered in the Google Play Store, according to researchers at Check Point. Joker, one of the most prominent types of malware for Android, keeps finding its way into Google’s official application market as a result of small changes to its code, which enables it to get past the Play store’s security and vetting barriers. This time, however, researchers report that the malicious actor behind Joker adopted an old technique from the conventional PC threat landscape and used it in the mobile app world to avoid detection by Google. To realize the ability of subscribing app users to premium services without their knowledge or consent, the Joker utilized two main components – the Notification Listener serv...

Inadequate Investment in Cybersecurity is Behind Increase in Cyber Attacks

Following on this week’s Life Healthcare cyberattack, the issue of cybersecurity has once again been brought to the fore as businesses and individuals are forced to evaluate whether measures in place are strong enough to withstand major breaches in their security. Life Healthcare is the third major South African company that has been targeted by hackers this year. In February, Nedbank warned that the information of about 1.7 million clients was potentially affected by a data breach, and the following month chemicals and fertiliser maker Omnia Holdings said it’s IT infrastructure was subject to a cyberattack. Amongst the other big businesses that have been targeted in South Africa are Johannesburg City Council, Capitec Bank and Telkom. The trend is also true for the rest of the continent. I...

5 Ways to Protect Your Business from Mobile Adware

One of the most common forms of cyberthreats designed to collect personal information from a user’s device is mobile adware. This is because roughly 4 billion people are connected to the Internet via their smartphone. Despite the adoption of mobile devices, companies rarely prioritize mobile security. Check Point’s Cyber Security Report 2020 shows that in 2019, 27% of companies suffered a cyber-attack because the security of a mobile device was breached. “It only takes one compromised mobile device for cybercriminals to steal confidential information and access an organization’s corporate network,” explains Pankaj Bhula, Regional Director for Africa at Check Point. The main problem with adware is pinpointing how a phone became infected. Adware is developed to sneak onto a device undetected...