Posts filtered by tags: Check Point[x]


 

Boris Johnson will keep using Zoom for the government's private weekly meeting despite security and privacy concerns

The UK government has defended using video-call service Zoom among senior government officials – including Boris Johnson – due to 'unprecedented circumstances' caused by the coronavirus.  On Monday, the firm's stock price climbed 22%. The firm is worth about $37 billion. But cybersecurity experts have raised questions around Zoom's security and data privacy policies, with reports that the Ministry of Defence has banned staff from using it.  Boris Johnson used Zoom on Tuesday to hold his first ...
Tags: Google, UK, Trends, Ministry Of Defence, Boris Johnson, Cabinet, Press Association, Check Point


Android malware found farming ads for cash in kids’ apps on Google’s Play Store

A new malware family, dubbed Tekya, has infected multiple children’s Android apps, farming ad clicks to earn money. Cybersecurity firm Check Point found that the previously undetected malware was present in 56 apps — 24 of them were targeted towards kids — on Google Play Store. The apps were collectively downloaded over a million times. The firm noted that these applications mimicked users’ actions on Android to serve ads from networks such as Google’s AdMob, AppLovin’, Facebook, and Unity. Hack...
Tags: Google, Security, Startups, Facebook, Apps, Check Point, Tekya, Unity Hackers


Coronavirus domains 50% more likely to infect your system with malware

As if the threat of an epidemic wasn’t enough, now you also have to watch out for coronavirus-themed malware. That’s according to new research from security firm Check Point, which found coronavirus-themed domains are 50% more likely to spread malicious activity than other domains. [Read: CIA agents have been hacking China for 11 years, security firm claims] There have been over 4,000 coronavirus-themed domains registered since January. Out of those, 3% were flagged as malicious, and another 5% ...
Tags: Security, Startups, China, Cia, Check Point


Israeli Soldiers Tricked Into Installing Malware By Hamas Agents Posing As Women

An anonymous reader quotes a report from ZDNet: Members of the Hamas Palestinian militant group have posed as young teenage girls to lure Israeli soldiers into installing malware-infected apps on their phones, a spokesperson for the Israeli Defence Force (IDF) said today. Some soldiers fell for the scam, but IDF said they detected the infections, tracked down the malware, and then took down Hamas' hacking infrastructure. IDF said Hamas operatives created Facebook, Instagram, and Telegram account...
Tags: Tech, Hamas, Facebook Instagram, IDF, Check Point, Israeli Defence Force IDF, Hild Silberman, Gen Silberman


Time to patch your lightbulb? Researchers demonstrate Philips Hue exploit

First the lightbulb. Then the controller. Then your internal network. Researchers at Check Point have demonstrated how to infect a network with malware via a simple IoT device, a Philips Hue smart lightbulb.…
Tags: Software, Philips, Check Point


A vulnerability lets hackers gain entry to people's computers using Philips Hue smart bulbs. Here's how to protect against it.

A vulnerability in some smart home devices makes it possible for hackers to take control of people's laptops by attacking those devices, according to security firm Check Point. The vulnerability affects all smart home devices that use the Zigbee protocol, including Philips Hue Smart Light Bulbs and Amazon Echo. Philips Hue has listed the risk as "high" severity and is urging users to update their devices to install a patch. Visit Business Insider's homepage for more stories. Security researc...
Tags: Google, Amazon, Trends, Iowa, Philips, Philips Hue, Amazon Echo, Zigbee, Check Point, Yaniv Balmas, Amazon Apple, Yianni, George Yianni, Philips Hue Smart Light Bulbs, Amazon Echo Philips Hue, Check Point Check Point


A vulnerability lets hackers gain entry to people's computers using devices like Philips Hue smart bulbs and Amazon Echo. Here's how to protect against it.

A vulnerability in some smart home devices makes it possible for hackers to take control of people's laptops by attacking those devices, according to security firm Check Point. The vulnerability affects all smart home devices that use the Zigbee protocol, including Philips Hue Smart Light Bulbs and Amazon Echo. Philips Hue has listed the risk as "high" severity and is urging users to update their devices to install a patch. Visit Business Insider's homepage for more stories. Security researc...
Tags: Apple, Google, Amazon, Trends, Iowa, Philips, Philips Hue, Amazon Echo, Zigbee, Check Point, Yaniv Balmas, Amazon Apple, Amazon Echo Here, Yianni, George Yianni, Philips Hue Smart Light Bulbs


Major security flaws found on TikTok left people's sensitive personal data and videos vulnerable to hackers

TikTok is one of the most popular social networks in the world , but it's also raised cybersecurity and privacy concerns due to its ties to China. Cybersecurity research firm Check Point recently discovered multiple security flaws within the app that made it possible for hackers to access users' accounts, post videos, and view people's personal information and sensitive data. There is no evidence the vulnerabilities were exploited by hackers. The research firm said the vulnerabilities were fi...
Tags: Hong Kong, Instagram, Australia, California, China, US, Trends, The New York Times, The Washington Post, Check Point, Watch Google, Tiktok, China Cybersecurity, ByteDance Most


TikTok vulnerability could have allowed hackers to take over users’ profiles

Security research firm, Check Point says it found multiple severe loopholes within TikTok that could have potentially allowed hackers to take over users’ accounts and upload videos on their behalf.
Tags: Security, Trends, Social Media, Check Point, Tiktok


Major TikTok Security Flaws Found

The vulnerabilities, which the app says it has fixed, could have let attackers manipulate content and extract personal data.
Tags: News, China, Computer Security, Check Point, Mobile Applications, Downloads and Streaming, Video Recordings, Cyberattacks and Hackers, TikTok (ByteDance


Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News. With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile [Author: [email protected] (Swati Khandelwal)]
Tags: Tech, Hacking News, Cyber Security, Data Breach, Antivirus, Swati Khandelwal, Check Point, Forum Software, Hacking Forum, Check Point Technologies, VBulletin, Cyber Security Software, ZoneAlarm


New Android adware found in 200 apps on Google Play

Security researchers have found a new kind of mobile adware hidden in hundreds of Android apps, and downloaded more than 150 million times from Google Play. The malware masquerading as an ad-serving platform, dubbed SimBad by researchers at security firm Check Point, infected more than 200 apps which, likely unbeknownst to the app developer, would open a backdoor to install additional malware as a way to outsmart Google’s app store scanning. Once installed, the downloaded malware also removes th...
Tags: Google, Android, Google Play, Security, Google Search, Tech, Malware, App-store, Simulation, App Developer, Check Point, Real Tractor Farming Simulator, Ambulance Rescue Driving, Aviran Hazum, Hazum


Flaws in Popular RDP Clients Allow Malicious Servers to Reverse Hack PCs

You've always been warned not to share remote access to your computer with any untrusted people for many reasons—it's basic cyber security advice, and common sense, right? But what if I say, you should not even trust anyone who invites or offers you full remote access to their computers? Security researchers at cybersecurity firm Check Point have discovered more than two dozen [Author: [email protected] (Swati Khandelwal)]
Tags: Tech, Hacking News, Vulnerability, Remote Code Execution, Swati Khandelwal, Check Point, Windows Hacking, RDP exploit, RDP server hacking


Fortnite Bugs Gave Hackers Access To Millions of Player Accounts, Researchers Say

Researchers at cybersecurity firm Check Point say three vulnerabilities chained together could have allowed hackers to take control of any of Fortnite's 200 million players. "The flaws, if exploited, would have stolen the account access token set on the gamer's device once they entered their password," reports TechCrunch. "Once stolen, that token could be used to impersonate the gamer and log in as if they were the account holder, without needing their password." From the report: The researchers...
Tags: Tech, Epic Games, Check Point, Fortnite


‘Fortnite’ security flaw let hackers spy on players through microphones

A security vulnerability found in Fortnite allowed hackers to gain access to other players' accounts, potentially letting them spy on conversations using the in-game microphone. It has been addressed. The post ‘Fortnite’ security flaw let hackers spy on players through microphones appeared first on Digital Trends.
Tags: Security, Gaming, News, Trends, Hackers, Epic Games, Check Point, Fortnite


Fortnite bugs put accounts at risk of takeover

With one click, any semi-skilled hacker could have silently taken over a Fortnite account, according to a cybersecurity firm who says the bug is now fixed. Researchers at Check Point say the three vulnerabilities chained together could have affected any of its 200 million players. The flaws, if exploited, would have stolen the account access token set on the gamer’s device once they’ve entered their password. Once stolen, that token could be used to impersonate the gamer and log in as if they we...
Tags: Tech, Epic Games, Check Point, Nick Chester, Fortnite, Vanunu, Oded Vanunu


Security flaw in DJI’s website and apps exposed accounts to hackers and drone live feeds

It took about six months for popular consumer drone maker DJI to fix a security vulnerability across its website and apps, which if exploited could have given an attacker unfettered access to a drone owner’s account. The vulnerability, revealed Thursday by researchers at security firm Check Point, would have given an attacker complete access to a DJI users’ cloud stored data, including drone logs, maps, any still or video footage — and live feed footage through FlightHub, the company’s fleet ...
Tags: Security, Gadgets, Tech, Spokesperson, Vulnerability, Hacking, Internet Security, Dji, North America, Amazon Web Services, Computer Security, Check Point, Adam Lisberg, Oded Vanunu, Lisberg, Mario Rebello


Malicious Faxes Leave Firms 'Open' To Cyber-Attack

Booby-trapped image data sent by fax can let malicious hackers sneak into corporate networks, security researchers have found. From a report: Since many companies use fax machines that are also printers and photocopiers, they often have a connection to the internal network. The malicious images exploit protocols established in the 1980s that define the format of fax messages. The research was presented at the Def Con hacker conference in Las Vegas. The two researchers said millions of companies ...
Tags: Tech, Bbc, Las Vegas, Check Point, Yaniv Balmas, Balmas, Eyal Itkin


WhatsApp Flaw Could Allow Hackers To Modify, Send Fake Messages

A recently discovered flaw in WhatsApp could allow hackers to modify and send fake messages (Warning: source may be paywalled; alternative source). Researchers at the Israeli cybersecurity firm Check Point said the vulnerability gives a hacker the possibility "to intercept and manipulate messages sent by those in a group or private conversation" as well as "create and spread misinformation." The New York Times reports: WhatsApp acknowledged that it was possible for someone to manipulate the quot...
Tags: Tech, New York Times, Check Point, Check Point Software, Carl Woog


How hack on 10,000 WordPress sites was used to launch an epic malvertising campaign

Crooks exploited legit web ad ecosystem – researchers Security researchers at Check Point have lifted the lid on the infrastructure and methods of an enormous "malvertising" and banking trojan campaign.…
Tags: Software, Check Point


Supply-Chain Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. It's a legitimate fear, and perhaps a prudent action. But it's just one instance of the much larger issue of securing our supply chains. All of our computerized systems are deeply international, and we have no choice but to trust the companies and governments that touch those systems. And while we can ban a few specific product...
Tags: Apple, Google, Microsoft, Washington Post, China, Russia, US, Cisco, Taiwan, Military, United States, Edward Snowden, Kaspersky, Pentagon, Essays, Symantec


Crypto-mining malware nets hacker group $3.4 million worth of Monero coins

Israeli security firm Check Point uncovered a large-scale cryptocurrency mining operation which installed malware on servers running Jenkins, an automation software designed for web development. The post Crypto-mining malware nets hacker group $3.4 million worth of Monero coins appeared first on Digital Trends.
Tags: Trends, Computing, Crypto, Jenkins, Check Point, Monero


Researchers found porn malware in Google Play children’s games

Security firm Check Point today revealed it had discovered malware on the Google Play store disguised as children’s games — malware that gives kids ads not suited for their age group. Checkpoint’s report on the malware warns it shows pornographic ads which would obscure the actual game, including one featuring a picture of Kim Kardashian — fittingly, the code is called AdultSwine. In some cases, the virus would prompt users to download fake anti-virus software. In others, it would try to trick t...
Tags: Google, Startups, Kim Kardashian, Reuters, Check Point


AdultSwine malware spreading smut through kid's apps on Google Play Store

'Mummy, what's feltching?' Security researchers at Check Point have found nearly 70 apps containing malware that slipped past Google's code-checking systems and exposed kids and parents to potentially unwanted sex education lessons.…
Tags: Google, Software, Check Point


22 different flashlight apps in Google Play were found to contain malicious adware (GOOG, GOOGL)

22 flashlight and utility apps in Google Play were found to carry malicious adware. The adware, dubbed LightsOut by security researchers, would spam Android phones with illegal advertisements, whether or not the app was in use. Google Play has since removed all 22 apps. Many security advocates tell Android users to only download apps from Google Play, the official store that Google operates for Android apps, in order to avoid viruses and spam. But even Google Play can fall victim to maliciou...
Tags: Google, Amazon, Google Play, Trends, Check Point, Check Point Google


Data integrity could literally save the world from nuclear facility attacks

When the Department of Homeland Security and F.B.I. revealed in June that cyber attackers penetrated the Wolf Creek nuclear facility, it was the latest in a string of recent hacks against critical infrastructure targets. It was followed just ten days later by the news of the (allegedly) Russian attack on Ireland’s energy network. The upsurge of attacks against industrial targets this year was a true escalation with potentially disastrous real-world implications. I have spent my career, first in ...
Tags: Security, Startups, Ireland, Contributors, Check Point, Wolf Creek


Is your vacuum spying on you? The high-tech LG Hom-Bot is vulnerable to hackers

While your robot vacuum is cruising around your home or office, it could be secretly recording everything it sees and even messing with your other appliances. A Hom-Bot security flaw shows how hackers can exploit your Internet of Things. The post Is your vacuum spying on you? The high-tech LG Hom-Bot is vulnerable to hackers appeared first on Digital Trends.
Tags: Trends, Computing, Lg, Smart Home, Emerging Tech, Check Point, Robot Vacuum, LG Hom Bot, Hom-Bot


Is your high-tech robot vacuum letting hackers into your home?

While your robot vacuum is cruising around your home or office, it could be secretly recording everything it sees and even messing with your other appliances. A Hom-Bot security flaw shows how hackers can exploit your Internet of Things. The post Is your high-tech robot vacuum letting hackers into your home? appeared first on Digital Trends.
Tags: Trends, Computing, Lg, Smart Home, Emerging Tech, Check Point, Robot Vacuum, Hom-Bot


Your high-tech robot vacuum could be allowing hackers virtual access to your home

While your robot vacuum is cruising around your home or office, it could be secretly recording everything it sees and even messing with your other appliances. A Hom-Bot security flaw shows how hackers can exploit your Internet of Things. The post Your high-tech robot vacuum could be allowing hackers virtual access to your home appeared first on Digital Trends.
Tags: Trends, Computing, Lg, Smart Home, Emerging Tech, Check Point, Robot Vacuum, Hom-Bot


Bug in Mobile App Lets Hackers Take Control of LG Smart Devices

A reader shares a BleepingComputer report: LG Electronics has avoided a security disaster this summer after it worked with security researchers to patch a vulnerability in the mobile app that customers are using to control a breadth of LG smart home devices. The vulnerability affects the LG SmartThinQ app used to control all of LG's "smart" home appliances, a list that includes devices such as smart ovens, vacuums, dishwashers, refrigerators, washing machines, dryers, air conditioners, and more....
Tags: Tech, Lg, Ac, LG Electronics, Check Point, LG Smart Devices