Checkpoint
Chinese hackers target Premier of Western Australia in email Cyber Attack
Mark McGowan, the head of the government branch of Western Australia smartly referred to as ‘Premier’ was targeted in a cyberattack by a Chinese hacking group named Naikon. The attack was devastating and was in the form of MS Word Document meant to access digital data from the victim’s PC and was developed in such […]
Checkpoint acquires Protego
Serverless Security technology offering company Protego was acquired by Checkpoint Software Technologies for an undisclosed amount. And the latter expects to integrate the former’s technology into its Infinity Architecture to secure its technologies related to mobile, cloud, endpoint, IoT and network from sophisticated cyber attacks. Sources reporting to Cybersecurity Insiders say that the company’s technology […]
Security in our Mobile Phones is extremely weak say CheckPoint experts
Security experts from the CheckPoint Software Technologies, the Israel based cybersecurity firm say that the security factor in our mobile phones is extremely weak making them vulnerable to cyber attacks in a big way in 2019. Tony Jarvis, a Security Evangelist for Asia Pacific region, CheckPoint Technologies said that the vulnerability scale in the year […]
Enterprises around the globe must be ready for Mega Cyber Attacks
Check Point Software Technologies, an Israel based cyber security firm has released a press statement which says that Enterprises operating around the world should prepare themselves to face ‘mega’ cyber attacks. “Large scale cyber attacks have been targeting mobile, cloud and on-premise networks and they are scaling and fast moving like never before. And fifth […]
WhatsApp users should be aware of this Cyber Security Vulnerability
All those who are using WhatsApp, you better be aware of this new cybersecurity threat related to WhatsApp. It’s said that a bug in the said messaging app allows hackers to infiltrate into their WhatsApp app and send messages and group chats to near and dear ones without your knowledge. And if this flaw can […]