You searched for Check Point Software | SC Media

Your search for Check Point Software returned 721 results

Your search for Check Point Software returned 721 results

Sort Results:

Relevant Recent
Network Security, Secondary Featured, Security News

Fake Cisco switches provoked network failures

Counterfeit Cisco devices were behind the failure of an IT company’s network switches last fall after a software upgrade, an investigation has found. Underscoring the security challenges posed by counterfeit hardware, the real-life anecdote prompted the victimized purchaser to commission F-Secure’s hardware security team to perform a thorough analysis of the components. The company discovered that…
Network Security, Secondary Featured, Security News, Vulnerabilities

Microsoft sounds alarm to fix wormable bug “SIGRed”

Microsoft Corporation on Patch Tuesday addressed 123 vulnerabilities — 18 of them critical — including a “wormable” flaw in Windows DNS Service that could be leveraged to execute remote code in the context of the Local System Account and then spread malware across various network devices. Officially designated CVE-2020-1350, the wormable flaw is caused by…
Malware, Mobile Security, Privacy & Compliance News and Analysis, Security News

Glupteba malware leverages blockchain as a communications channel

Glupteba malware does something novel: It uses the bitcoin blockchain as a communications channel to receive updated configuration information. That’s important because malware always needs a way to go back to its home base, preferably without being detected, according to a paper released this week by Sophos Labs researchers. The new form of malware sprinkles…
Events, InfoSec World 2020, Network Security, Security News

Lululemon’s Rex Sarabia works up a sweat building a security awareness program from scratch

At InfoSec World 2020 on Monday, Rex Sarabia, security awareness program manager at Lululemon, led the session “Building an Enterprise Security Awareness Program from the Ground Up.” SC Media interviewed Sarabia about his presentation to learn more about Sarabia’s biggest challenges, his tips for security professionals starting up their own programs, and how he “gamifies”…
IoT, Network Security, Security News, Vulnerabilities

Ripple20 bugs in scores of IoT devices reveal third-party code dangers

Hundreds of millions of Internet of Things (IoT) products use a TCP/IP software library containing severe vulnerabilities that can be exploited for remote code execution and complete device takeover, say researchers who also warn that the bug has been extremely difficult to track across the IoT supply chain due to liberal adoption of the third-party…
Cybercrime, Malware, Mobile Security, Security News

Malware found in popular barcode apps produces ads that instantly vanish

A pair of Android barcode reader apps that were downloaded more than 1 million times were found to contain ad fraud malware that tries to stay hidden by generating advertisements that instantly disappear from view. The malware, detected as AndroidOS_HiddenAd.HRXJA, can operate in the background even when infected devices aren’t actively being used, and it…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Coronavirus, Security News

5 ways COVID-19 is reshaping the cybercrime economy

As the COVID-19 pandemic pushes the above-ground economy to the brink of a major recession, the cybercrime economy appears to still be hard-charging ahead. And yet, the virus has rapidly reshaped the way business is being done on the dark web, as buyers and sellers jump on the opportunity to capitalize on global fears, as…
Executive Insight, Opinion

Putting zero trust into action

If awards were given for “Security Phrase of the Year”, surely zero trust would win the top prizes for 2019. The term graced the headlines of countless cyber industry articles, blogs, case studies and PowerPoint presentations, all created by organizations hoping to harness the power of this construct. The excitement is understandable, because it sure…
Coronavirus, News Archive, Security News

VPNs: Not a cybersecurity slam dunk for telecommuters in the age of COVID-19

CISOs and cybersecurity teams around the world are watching their threat surface multiply as millions of staffers find themselves working from home for the first time in order to help constrain the spread of Coronavirus. The removal of these people from the safe and controlled working environment found in their offices and tossing them into…
Next post in Coronavirus