gridinsoft-logo
  • Products
    • Anti-Malware
    • Trojan Killer [Portable Edition]
    • Trojan Scanner [Android Edition]
    • Comparison
  • Our Team
    • Find a Job
    • COURSES FOR DEVELOPERS
  • Resources
    • Tech News & Security Tips
    • Learn About Cybersecurity
    • Reviews
    • Help Center
    • Release History
  • Contacts
  • | Member Area |
  • DOWNLOAD NOW
  • CN
  • UA
Skip to content
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs
Logo

Tag: Check Point

  • Security News

Dangerous bug in WhatsApp could lead to disclosure of user data

imageByVladimir KrasnogolovySeptember 3, 2021
Dangerous bug in WhatsApp could lead to disclosure of user data
Check Point specialists spoke about a dangerous bug they discovered in the WhatsApp image processing function, which could lead to the disclosure of user data. The problem helped to disable the application, in addition, by applying certain filters to a specially created

Read More

  • Security News

Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device

imageByVladimir KrasnogolovyAugust 6, 2021
Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device
Check Point researchers reported that in April of this year, IT giant Amazon eliminated critical vulnerabilities in the Amazon Kindle. The problems could be used to gain full control over the device, allowed them to steal the Amazon device token and other confidential data

Read More

  • Mobile Security
  • Security News

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

imageByVladimir KrasnogolovyMay 7, 2021
Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones
More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile Station Modem (MSM). This bug gives attackers access to call history, SMS messages, and even allows them to eavesdrop on conversations. MSM is a SoC that allows

Read More

  • Security News

Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals

imageByVladimir KrasnogolovyMarch 23, 2021
Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals
CheckPoint experts found that the number of job search ads on the darknet and on hacker forums is growing – job seekers that were desperate to find a job are now ready to work for cybercriminals. Check Point reports that a new trend has emerged at the beginning of

Read More

  • Mobile Security
  • Security News

Hackers majorly use Microsoft and DHL brands in phishing attacks

imageByVladimir KrasnogolovyJanuary 18, 2021
Hackers majorly use Microsoft and DHL brands in phishing attacks
Hackers majorly use the Microsoft and DHL brands in phishing attacks. In Q4 2020, cybercriminals used more brands from the tech industry, followed by shipping and retail businesses. Information security researchers from the Check Point Software team said that phishers love

Read More

  • Security News

About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library

imageByVladimir KrasnogolovyDecember 4, 2020
About 8% of apps in the Google Play Store are vulnerable to a bug in the Play Core library
Check Point experts warned that developers of many popular Android applications forgot to make an important update and now their product is vulnerable to a bug in the Play Core library. So, according to the company, about 8% of all applications in the Google Play Store use

Read More

  • Security News

New Pay2Key ransomware encrypts corporate networks in just an hour

imageByVladimir KrasnogolovyNovember 11, 2020
New Pay2Key ransomware encrypts corporate networks in just an hour
A number of companies and large corporations in Israel have been targeted by cyberattacks using a new ransomware called Pay2Key. The first attacks were recorded by specialists from Check Point at the end of October this year, and now their number has increased. According to

Read More

  • Security News

In August, the updated Qbot Trojan first entered the top of the most widespread malware

imageByVladimir KrasnogolovySeptember 15, 2020
In August, the updated Qbot Trojan first entered the top of the most widespread malware
Check Point has released its monthly Global Threat Index for August 2020. According to the researchers, the updated Qbot Trojan (aka QuakBot, Qakbot and Pinkslipbot) first entered the TOP of the most widespread malware in the world, where it took tenth place. Experts

Read More

  • Security News

Vulnerabilities in Amazon Alexa opened access to user data for outsiders

imageByVladimir KrasnogolovyAugust 17, 2020
Vulnerabilities in Amazon Alexa opened access to user data for outsiders
In June this year, researchers from Check Point discovered a number of dangerous vulnerabilities that opened for attacks the Amazon Alexa virtual assistant and its users. The problem was in CORS and XSS bugs, which affected several Amazon subdomains, and in configuration

Read More

  • Security News

Google cloud services are used for phishing

imageByVladimir KrasnogolovyJuly 22, 2020
Google cloud services are used for phishing
Attackers, whose main goal is to steal various credentials, are increasingly turning to public cloud services to host decoy files and phishing pages. Even Google services are now being used for phishing. Check Point experts warn that earlier this year they discovered a

Read More

Posts navigation

Page 1 Page 2 NextNext page

Trending Articles

How To Reset Browser Settings?

June 23, 2018

How To Send System Information For Analysis

June 23, 2018

How To restore quarantined files?

June 15, 2018

Image
Use Strong Passwords to Can’t be Hacked Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses How annoying these messages are! My mailbox is flooded with these nasty offers, and I sometimes struggle to understand if the message is normal or spam!. Can I solve that?

Our Products:

  • Anti-Malware
  • Trojan Killer Portable
  • Android Trojan Scanner

Member Area:

  • Sign In

Solutions:

  • Spyware Remover
  • Ransomware Protection Tool
  • Virus Scanner & Removal Tool
  • Trojan Scanner & Removal Tool
  • Adware Removal Tool

Cybersecurity:

  • Spyware
  • Malware
  • Ransomware
  • Hacking
  • Darknet
  • Exploits
  • Antivirus
  • Adware
  • Backdoor
  • Botnet
  • Data Breaches
  • DDoS
  • Phishing
  • Trojan
Footer Logo
  • Terms of Use
  • Privacy Policy
  • How to Uninstall
  • How we use your data
Copyright © Gridinsoft LLC
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs

Latest Articles

  • Information Security Specialist Showed How to Steal a Tesla CarMay 19, 2022
  • Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT MalwareMay 18, 2022
  • Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM RelayMay 17, 2022
  • What Is Internet Protocol: IP Address DefinitionMay 16, 2022
  • What is SSL Certificate?May 16, 2022