Richard Clayton

26 POSTS 0 COMMENTS

OSX Malware is Catching Up, and it wants to Read Your...

People often assume that if you’re running OSX, you’re relatively safe from malware. But this is becoming less and less true, as evidenced by...

Check Point Discloses Vulnerability that Allowed Hackers to Take over Hundreds...

One of the most concerning revelations arising from the recent WikiLeaks publication is the possibility that government organizations can compromise WhatsApp, Telegram and other...

2016 H2 Global and Regional Threat Intelligence Trends

Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social media, mobile platforms, email, and web pages. At the same...

An In-depth Look at the Gooligan Malware Campaign

Check Point mobile threat researchers today published a technical report that provides deep technical analysis of the Gooligan Android malware campaign, which was first announced on...

More Than 1 Million Google Accounts Breached by Gooligan

As a result of a lot of hard work done by our security research teams, we revealed today a new and alarming malware campaign....

ImageGate: Check Point uncovers a new method for distributing malware through...

Check Point researchers identified a new attack vector, named ImageGate, which embeds malware in image and graphic files. Furthermore, the researchers have discovered the...