Tags Check Point

A phishing campaign's collateral damage: Stolen passwords were publicly searchable

by Joe Warminsky • 5 days ago

The attackers made a mistake by not securing files once they were posted to sites set up to receive stolen data, say researchers from Check Point and Otorio.

Flaws in Qualcomm chips could allow snooping, Check Point finds

by Shannon Vavra • 6 months ago

Qualcomm Technologies Snapdragon chips have over 400 vulnerabilities, some of which could allow hackers to spy on users’ GPS location.

Chinese spies hop from one hacked government network to another in Asia Pacific, researchers say

by Sean Lyngaas • 9 months ago

The report makes clear that, years after being exposed, Naikon’s hackers are singularly focused on delivering intelligence on China’s regional rivals.

The latest in FBI impersonation: An extortion scheme involving mobile ransomware

by Sean Lyngaas • 9 months ago

Ransomware on mobile phones may not be the most profitable avenue for criminals, but that hasn't stopped some from trying to make a buck.

Scammers tried using kids apps in the Google Play store to generate cash

by Jeff Stone • 10 months ago

The 56 apps had more than one million downloads, according to Check Point.

Hackers seize on coronavirus fears for fodder in spearphishing, misinformation schemes

by Shannon Vavra • 11 months ago

Hackers frequently take advantage of crises and current events to tailor their messages better.

TwitterFacebookLinkedInRedditGmail