Home » Check Point Security

Check Point Security

Beware: These Are The Top 10 Brands Imitated in Phishing Attacks

Image sourced from Kaspersky. Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cyber security solutions globally, has published its new Brand Phishing Report for Q3 2021. The report highlights the brands which were most frequently imitated by criminals in their attempts to steal individuals’ personal information or payment credentials during July, August and September. In Q3, Microsoft continued its reign as the brand most frequently targeted by cybercriminals, albeit at a slightly lower rate. Twenty-nine per cent of all brand phishing attempts were related to the technology giant, down from 45% in Q2 2021, as threat actors continue to target vulnerable, distributed workforces during the COVID-19 pandemic. Amazon has replac...

Fake COVID-19 Vaccination Certificates for Sale on the Dark Net

While the global roll-out of COVID-19 vaccinations continues to accelerate, it’s worth remembering that only around 1% of the world’s population have received their full course of injections. Billions are still waiting for their first dose, which inevitably leads those people to question exactly when they will get it. Especially as plans are being made internationally to allow those that have been vaccinated, or can prove they have had a recent negative test, the freedom to travel to other countries, attend large-scale events, take a new job, and more. So there’s a strong and growing demand for vaccinations and test results because of the greater freedoms they will give to people. And of course, there will always be people who don’t want to wait for their official vaccination, or for an of...

7 Cybersecurity Predictions for 2021

COVID-19 will continue to be a key focus for organizations’ IT and security teams, says cybersecurity solutions company Check Point. “The pandemic derailed business-as-usual for virtually every organization, forcing them to set aside their existing business and strategic plans, and quickly pivot to delivering secure remote connectivity at massive scale for their workforces,” says Pankaj Bhula: Check Point’s EMEA Regional Director. “Security teams also had to deal with escalating threats to their new cloud deployments, as hackers sought to take advantage of the pandemic’s disruption:  71% of security professionals reported an increase in cyber-threats since lockdowns started,” “One of the few predictable things about cyber-security is that threat actors will always seek to take advanta...

3 Things You Should Do if You Suspect Infected Apps On Your Android Device

Sourced from Forbes A new variant of the Joker Dropper and Premium Dialer spyware has been discovered in the Google Play Store, according to researchers at Check Point. Joker, one of the most prominent types of malware for Android, keeps finding its way into Google’s official application market as a result of small changes to its code, which enables it to get past the Play store’s security and vetting barriers. This time, however, researchers report that the malicious actor behind Joker adopted an old technique from the conventional PC threat landscape and used it in the mobile app world to avoid detection by Google. To realize the ability of subscribing app users to premium services without their knowledge or consent, the Joker utilized two main components – the Notification Listener serv...