AI-Enabled Samsung Galaxy Z Series with Innovative Foldable Form Factor & Significantly Improved Screen Delivers New User Experiences Across Productivity, Communication & Creativity The…
On April 3rd 2016 a collective of international newspapers and the International Consortium of Investigative Journalists (ICIJ) dropped a bombshell – they had millions…
Over the last several months, the BBC, the New York Times, and other major news and commercial websites became victims of Malvertising attacks. What…
As consumers wind down for a much-needed year-end break, cybercriminals are entering their busiest time of year. A time when consumers are quick to…
A year in cybersecurity can seem like an eternity. But despite the rapid changes, many things remain constant. Check Point’s top three predicted security…
Taking the path of least resistance is natural – it’s why rivers flow around mountains, and electricity finds the easiest route to earth. It…
When the prolific criminal Willie Sutton was asked why he specifically targeted banks, he purportedly replied: “Because that’s where the money is.” So it’s…
An attack on Anthem, the second-largest health insurer in the U.S., which exposed identifiable personal data of tens of millions of people, has again…
Last year was a difficult time for businesses when it came to cybercrime. In the US, organisations including Sony and eBay were compromised when…
2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged,…
Twenty years ago Stephen Hawking, the leading physicist and author, said that computer viruses should be treated as a life form, as they exploit…