Technology news for Australia's largest enterprises
These search results are from across the Techday network of sites
Five million Android devices possibly infected with 'aggressive' pre-installed adware
They claim Honor, Huawei and Xiaomi devices are most affected by the ‘extremely aggressive ad network’.
Not a Bitcoin owner? You're still fair game for a cryptomining attack
Check Point has released a 'cryptomining 101' document that details how cybercriminals hack into devices to steal their CPU power for illicit mining.
Cryptomining malware affected 42% organisations worldwide in Feb
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Check Point expands portfolio to continue fight against Gen V cyber attacks
Check Point has been busy crafting a number of security solutions for its global market in recent months.
Check Point releases January’s ‘most wanted’ malware
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Parents beware! Malware may be hitchhiking on game apps
Check Point researchers have revealed a new and nasty malicious code hiding on Google Play Store.
CheckPoint aims to tackle mental health issues using video games
Non-profit organisation CheckPoint has released its first full trailer for the upcoming CheckPoint series.
Crypto-miners creating havoc for businesses: Coinhive 'Most Wanted' malware
Crypto-mining malware variants are causing headaches for enterprises and their computers as website owners try to recoup revenue, says Check Point.
Cisco maintains grip on IT security market after ‘strong channel partner focus’
Canalys has released its latest predictions surrounding the global IT security market’s performance over the third quarter in 2017.
Round 2: New line-up of cybersecurity maestros comment on Uber breach
We covered an expert commentary story of the Uber breach - this is round 2 with Check Point, Barracuda, Digital Shadows, Mimecast, and Webroot.
Check Point & LG plug security vulnerabilities in smart appliances
Check Point researchers recently worked with LG to plug vulnerabilities in a number of home appliances, including robot vacuum cleaners & dishwashers.
Reaper IoT botnet small but still dangerous, security experts warn
The Reaper IoT botnet is spreading fast, but it's still growing according to researchers at Qihoo and Arbor Networks.
Check Point uncovers major security flaw in LG smart devices
The vulnerabilities in the SmartThinQ mobile app and cloud application enabled hackers to gain control of home appliances and spy on users.
the IoTroop botnet: Could it be the next 'cyber hurricane'?
The rapid evolution of ‘IoTroop’ is happening much faster than the Mirai botnet; and it is enslaving IoT devices at a faster rate too.
Locky ransomware is back as one of September's 'most wanted' malware
“We’ve got ransomware taking up two of the top three spots – one a relatively new variant that just emerged this year, and the other an older family."
ExpensiveWall signs users up to fraudulent SMS services
Some Android users may notice fraudulent charges on their accounts if they have been infected by a new strain of malware dubbed “ExpensiveWall”.
6 months under siege: the malware story so far in 2017
Maya Horowitz, Threat Intelligence Group Manager at Check Point explores the major trends in global malware attacks during the first half of 2017.
Windows 10 security solutions powerless against 'bashware'
Every security solution on the market may be completely powerless to stop a vulnerability that could allow any malware to bypass Windows 10 systems.
Check Point, RMIT & MTA set challenge for cybersecurity students
“This Cyber Security Challenge will see Melbourne students share and develop ideas with Tel Aviv’ s next generation of cyber innovators."
Inside the Check Point & IBM collaboration: What's in store for the future of cyber defence
"We’re taking the next step in collaboration and are thrilled to have Check Point as a security partner to join and support this new ecosystem."
Check Point's latest threat research taken from data you can see in real time
Check Point has taken the latest results from its Cyber Attack Trends: Mid Year Report from data that viewers can see happening in real time.
Sententia talks IoT hacking, surveillance & modem backdoors at ASIAL Conference
“The internet is filth. It’s hackers and rats, infiltrating the internet. It’s our job to make it clean.”
Check Point’s second quarter financials exceed highest end of projections
Gil Shrewd says the company is rapt with the second quarter results, reporting the revenue growth to be healthy.
How CopyCat netted $1.5m ad revenue from 14 million infected Android devices
The malware, called CopyCat, originally infected users in Southeast Asia but has since spread to Oceania, Africa, Europe and the Americas.