Fixing the Zoom ‘Vanity Clause’
Check Point and Zoom have collaborated to fix the Vanity URL issue. Check Point and Zoom have...
Read MoreSelect Page
By Check Point Software Technologies | Friday, July 17, 2020, 9:32 AM Asia/Singapore | Newsletter, Video
Check Point and Zoom have collaborated to fix the Vanity URL issue. Check Point and Zoom have...
Read MoreBy Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies and webmaster webmaster | Monday, June 8, 2020, 2:13 PM Asia/Singapore | Newsletter, Opinions
Cybercriminals have turned the coronavirus pandemic into a scam pandemic as well—find out how to...
Read MoreBy webmaster webmaster | Monday, April 20, 2020, 11:28 AM Asia/Singapore | Newsletter, Tips
With the following tips and techniques, we can stand united against the heinous hackers who are...
Read MoreBy Omri Herscovici, Vulnerability Research Team Lead, Check Point Software Technologies and webmaster webmaster | Wednesday, April 1, 2020, 11:08 AM Asia/Singapore | Newsletter, Tips
In today’s remote-working frenzy, Zoom is an app that facilitates the inevitable...
Read MoreBy webmaster webmaster | Tuesday, March 31, 2020, 9:36 AM Asia/Singapore | News, Newsletter
Coronavirus-related domains are 50% more likely to be malicious than other domains registered in...
Read MoreBy webmaster webmaster | Thursday, March 19, 2020, 5:31 PM Asia/Singapore | Features
Over the past few months, Check Point’s researchers have painstakingly uncovered the identity of a...
Read MoreBy webmaster webmaster | Thursday, March 12, 2020, 10:04 AM Asia/Singapore | Features, Newsletter
Cryptocurrencies can be stolen without any hope of tracing or recovering the funds. Here is a...
Read MoreBy L L Seow | Monday, March 9, 2020, 12:02 PM Asia/Singapore | Features, Newsletter
Maybe, maybe not, because methodologies and parameters are outpaced by highly-liquid cybercriminal...
Read MoreBy webmaster webmaster | Monday, March 9, 2020, 9:42 AM Asia/Singapore | Cyber Intelligence, News, Newsletter, Tips
Cyber lure is a key social engineering tactic employed by state-sponsored and financially...
Read MoreBy webmaster webmaster | Monday, February 24, 2020, 11:01 AM Asia/Singapore | News, Newsletter
More than half of MioT devices remain susceptible to the BlueKeep, DejaBlue and other bugs despite...
Read More
PARTICIPATE NOW |
|