All resources sponsored by:

Check Point Software Technologies Ltd.

1 - 25 of 26 Matches
EternalBlue – Everything there is to know
sponsored by Check Point Software Technologies Ltd.
RESOURCE:Go inside this asset to learn everything you've ever wanted to know about the EternalBlue vulnerability. From its mysterious background, the 3 bugs it uses, and even the code it runs on.
Posted: 24 Oct 2017 | Published: 29 Sep 2017
Get This Now


Does Your Mobile Anti-Virus App Protect or Infect You? The truth behind DU Antivirus Security
sponsored by Check Point Software Technologies Ltd.
RESOURCE:Instead of protecting user data, DU Antivirus Security, did just the opposite. Instead of encrypting data, they used private information for commercial purposes without permission. Go inside to learn more about how DU Antivirus Security works, and how you can take steps to avoid other malicious apps like it in the future.
Posted: 20 Oct 2017 | Published: 18 Sep 2017
Get This Now


Marcher Marches On: The Anatomy of a Banker Malware
sponsored by Check Point Software Technologies Ltd.
RESOURCE:Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.
Posted: 20 Oct 2017 | Published: 28 Apr 2016
Get This Now


"The Next WannaCry" Vulnerability is Here – Let's Stop it before it's too Late
sponsored by Check Point Software Technologies Ltd.
RESOURCE:Go inside to learn why the WannaCry attack was able to exploit the EternalBlue vulnerability 2 months after a patch was released, where the next big attack might come from, as well as tips you can take to bolster your system now to defend against malware in the future.
Posted: 19 Oct 2017 | Published: 11 Aug 2017
Get This Now


Learn How You can Simplify Mobile Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.
Posted: 19 Oct 2017 | Published: 13 Jul 2017
Get This Now


From HummingBad to Worse: The History of the Yingmob
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Inside, learn about the malware known as HummingBad, the main tool of the Chinese cybercriminal group Yingmob. Find out what damage this malware can do, how it went global, and more.
Posted: 18 Oct 2017 | Published: 30 Dec 2016
Get This Now


The Mobile Banker Threat - from End to End
sponsored by Check Point Software Technologies Ltd.
RESOURCE:This resource offers an example of one strain of malware which infected Google Play, and shows you how easy it is for it to mutate, grow, and change to beat even advanced AVs. Read on to learn what you should do to protect yourself from these threats.
Posted: 17 Oct 2017 | Published: 17 May 2017
Get This Now


ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!
sponsored by Check Point Software Technologies Ltd.
RESOURCE:Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.
Posted: 17 Oct 2017 | Published: 14 Sep 2017
Get This Now


The Real Identity behind a Wave of Cyberattacks on Energy, Mining and Infrastructure Companies
sponsored by Check Point Software Technologies Ltd.
RESOURCE:This case study explores how, using a remote access Trojan known as NetWire and a keylogging program Hawkeye, a Nigerian hacker was able to steal thousands of dollars from companies. Read on to discover the larger trend of business email compromise attacks, and how you can better prepare your company to defend against them in the future.
Posted: 16 Oct 2017 | Published: 15 Sep 2017
Get This Now


The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST:Watch this webinar to learn how ransomware targets your end users and infiltrates your network and explore the history of ransomware form the 1989 AIDS Trojan to 2016's KeRanger attack.
Posted: 16 Oct 2017 | Premiered: May 16, 2016, 01:03 EDT (05:03 GMT)
Get This Now


Hacking the Smartphone: A Business Email Compromise in Action
sponsored by Check Point Software Technologies Ltd.
WEBCAST:Watch this webcast to view a live demonstration of a business email compromise or "whaling" attack in action, to help yourself better understand what you're up against. Then, find out what damages these attacks can cause, the probability of your organization being hit, and more.
Posted: 13 Oct 2017 | Premiered: May 30, 2017
Get This Now


A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017
Get This Now


Most Wanted Malware: Banking Trojans and Ransomware That Want Your Money
sponsored by Check Point Software Technologies Ltd.
RESOURCE:Read this rundown of the top 10 malwares that tried to steal your money in the summer of 2017.
Posted: 12 Oct 2017 | Published: 19 Sep 2017
Get This Now


2017 Cyberattack Trends
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This report outlines how the threat landscape has changed in 2017 when it comes to ransomware, banking and mobile threats. Read on to learn from the past, so you might better secure the future.
Posted: 02 Oct 2017 | Published: 02 Oct 2017
Get This Now


Ransomware: Attack Trends, Prevention, and Response
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Deepen your understanding of the threat of ransomware. Access this white paper and explore ways to better protect your business assets with best practices for attack prevention.
Posted: 11 Aug 2016 | Published: 11 Aug 2016
Get This Now


Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE:Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016
Get This Now


Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE:In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016
Get This Now


Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE:This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016
Get This Now


Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE:One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016
Get This Now


Removing Malware and Undetectable Windows AppLocker
sponsored by Check Point Software Technologies Ltd.
EGUIDE:A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
Get This Now


Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE:It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
Get This Now


Check Point Abra: A Virtual Secure Workspace
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints.
Posted: 28 Jun 2010 | Published: 28 Jun 2010
Get This Now


The New Face of Intrusion Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
Posted: 29 Sep 2009 | Published: 12 Jun 2009
Get This Now


Deliver Application-level Security at Data Center Performance Levels
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security.
Posted: 08 Sep 2008 | Published: 08 Sep 2008
Get This Now


Unified Threat Management: The security you need, the simplicity you want
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot.
Posted: 08 Sep 2008 | Published: 08 Sep 2008
Get This Now


1 - 25 of 26 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement