In their new white paper "Great Crypto Failures," CheckPoint Software Technologies researchers Ben Herzog and Yaniv Balmas poke fun of common malware encryption errors, and explain why some cybercriminals fail to master the art of encryption.
The number of unique malware families found actively attacking business networks grew 61 percent from January 2016 to June, with 2,420 distinct threats detected last month, according to CheckPoint Software Technologies' June Threat Index.
Cryptocurrency miners are becoming one of the most prolific threats facing everyone from CISOs to consumers, with CheckPoint naming this type of malicious software to its Ten Most Wanted Malware list for October.
Researchers are warning companies that the use of MDM technology opens up a loophole in protections added to Apple's iOS 9 to help prevent employees from downloading malicious software posing as legit enterprise apps.
A newly discovered smishing campaign is faking texts from the Czech Republic's postal service, hoping to trick recipients into downloading a malicious app containing a trojan horse designed to steal credit card information.
Attackers are infecting social media users with malware by embedding malicious code into image and graphic files and uploading them onto major websites and social networks including Facebook and LinkedIn. Researchers at CheckPoint Software Technologies discovered the attack vector – dubbed ImageGate – which exploits a “misconfiguration on the social media infrastructure to deliberately…
Cybercrime, Malware, Mobile Security, Security News
The developers of 210 mobile applications found on the Google Play Store were apparently tricked into building their programs using a malicious software developer kit that secretly implanted adware in their apps. The apps, many of which were packaged as driving or racing simulator games, were downloaded nearly 150 million times by Android device users,…