In their new white paper "Great Crypto Failures," CheckPointSoftware Technologies researchers Ben Herzog and Yaniv Balmas poke fun of common malware encryption errors, and explain why some cybercriminals fail to master the art of encryption.
The number of unique malware families found actively attacking business networks grew 61 percent from January 2016 to June, with 2,420 distinct threats detected last month, according to CheckPointSoftware Technologies' June Threat Index.
Cryptocurrency miners are becoming one of the most prolific threats facing everyone from CISOs to consumers, with CheckPoint naming this type of malicious software to its Ten Most Wanted Malware list for October.
Researchers are warning companies that the use of MDM technology opens up a loophole in protections added to Apple's iOS 9 to help prevent employees from downloading malicious software posing as legit enterprise apps.
A newly discovered smishing campaign is faking texts from the Czech Republic's postal service, hoping to trick recipients into downloading a malicious app containing a trojan horse designed to steal credit card information.
Attackers are infecting social media users with malware by embedding malicious code into image and graphic files and uploading them onto major websites and social networks including Facebook and LinkedIn. Researchers at CheckPointSoftware Technologies discovered the attack vector – dubbed ImageGate – which exploits a “misconfiguration on the social media infrastructure to deliberately…
Cybercriminals have been spiking game apps, including several aimed at children, with malware that displays pornographic ads, pushes fake security apps, and registers users for premium services with permission.