Australia's leading source of security and threat news
These search results are from across the Techday network of sites
Signs of erosion in Cisco’s IT infrastructure dominance
While still maintaining a significant lead, Cisco finished 2018 with a slightly smaller piece of the pie in the enterprise IT infrastructure market.
Check Point announces general availability for CloudGuard SaaS
CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email.
Use of banking trojans up 50%, cryptomining still dominant malware – report
Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most Wanted Ranking; Cryptomining remains top of the list.
Once legit site found to be cryptomining, 6,000 machines infected
Check Point researchers discovered a previously legitimate video software download site has moved into cryptomining, earning around US$700 a day.
No need for a browser - XMRig cryptomining malware enters top 10 most wanted malware list
“Cryptomining malware has been quite the success story for cybercriminals, and XMRig’s rise indicates that they are actively invested."
Gen V cyber attacks are here, but most firms are 10 years behind, says Check Point
Security vendor Check Point believes that the age of Gen V cyber threats is now upon us, but organisations’ security defences are 10 years behind.
Necurs botnet erupts from dormancy to churn out 100,000 spam emails over Easter
One of the world’s largest spam botnets is back in action and this time it is spreading a Trojan downloader that can deliver nasty malware surprises.
GandCrab: The 'agile' ransomware that is updated in real time
The GandCrab ransomware has been making headlines recently for being one of the few malware strains that developers update in real time.
Five million Android devices possibly infected with 'aggressive' pre-installed adware
They claim Honor, Huawei and Xiaomi devices are most affected by the ‘extremely aggressive ad network’.
Not a Bitcoin owner? You're still fair game for a cryptomining attack
Check Point has released a 'cryptomining 101' document that details how cybercriminals hack into devices to steal their CPU power for illicit mining.
Cryptomining malware affected 42% organisations worldwide in Feb
This persistent threat not only continues to chip away at enterprise CPU power, but once inside a network can carry out other malicious acts.
Check Point expands portfolio to continue fight against Gen V cyber attacks
Check Point has been busy crafting a number of security solutions for its global market in recent months.
Check Point releases January’s ‘most wanted’ malware
23% of organisations around the world were affected by Check Point's 'most wanted' malware in January, a 'lucrative' revenue stream for criminals.
Parents beware! Malware may be hitchhiking on game apps
Check Point researchers have revealed a new and nasty malicious code hiding on Google Play Store.
CheckPoint aims to tackle mental health issues using video games
Non-profit organisation CheckPoint has released its first full trailer for the upcoming CheckPoint series.
Crypto-miners creating havoc for businesses: Coinhive 'Most Wanted' malware
Crypto-mining malware variants are causing headaches for enterprises and their computers as website owners try to recoup revenue, says Check Point.
Cisco maintains grip on IT security market after ‘strong channel partner focus’
Canalys has released its latest predictions surrounding the global IT security market’s performance over the third quarter in 2017.
Round 2: New line-up of cybersecurity maestros comment on Uber breach
We covered an expert commentary story of the Uber breach - this is round 2 with Check Point, Barracuda, Digital Shadows, Mimecast, and Webroot.
Check Point & LG plug security vulnerabilities in smart appliances
Check Point researchers recently worked with LG to plug vulnerabilities in a number of home appliances, including robot vacuum cleaners & dishwashers.
Reaper IoT botnet small but still dangerous, security experts warn
The Reaper IoT botnet is spreading fast, but it's still growing according to researchers at Qihoo and Arbor Networks.
Check Point uncovers major security flaw in LG smart devices
The vulnerabilities in the SmartThinQ mobile app and cloud application enabled hackers to gain control of home appliances and spy on users.
the IoTroop botnet: Could it be the next 'cyber hurricane'?
The rapid evolution of ‘IoTroop’ is happening much faster than the Mirai botnet; and it is enslaving IoT devices at a faster rate too.
Locky ransomware is back as one of September's 'most wanted' malware
“We’ve got ransomware taking up two of the top three spots – one a relatively new variant that just emerged this year, and the other an older family."
ExpensiveWall signs users up to fraudulent SMS services
Some Android users may notice fraudulent charges on their accounts if they have been infected by a new strain of malware dubbed “ExpensiveWall”.