Fortnite vulnerability could have enabled account hijacking
The publisher of smash-hit online game Fortnite has closed a trio of serious vulnerabilities unearthed by researchers from security vendor Check Point.
The publisher of smash-hit online game Fortnite has closed a trio of serious vulnerabilities unearthed by researchers from security vendor Check Point.
Amazon wants you to push its buttons...HP sues former execs for $5 billion...Belgians say Facebook is flouting laws... and more tech news.
For the past two years, a cyberespionage group that likely operates from Lebanon has hacked into hundreds of defense contractors, telecommunications operators, media groups and educational organizations from at least 10 countries.
A serious vulnerability in an embedded Web server used by many router models from different manufacturers allows remote attackers to take control of affected devices over the Internet.
Hackers could have had an inside track on unpatched flaws in major software projects because of a critical vulnerability in Bugzilla, a system that many developers use to track and discuss bugs in their code.
Specialized servers used by many ISPs to manage routers and other gateway devices provisioned to their customers are accessible from the Internet and can easily be taken over by attackers, researchers warn.
It's been 20 years since Check Point Software Technologies shipped its first enterprise network firewall, marking the beginning of a mass market for firewalls that has protected millions of networks across the world.
Having completed its acquisition of ThreatGRID this week, Cisco put forward plans for how the TreatGRID sandboxing technology will fit in the Cisco security portfolio. The company also acknowledged it's not entirely clear yet on what to do about the many technology-sharing relationships that ThreatGRID has had with other vendors, including Cisco competitor, Check Point.
Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks.
Check Point Software Technologies today said it is extending its security architecture to be able to incorporate more threat-intelligence data that could be shared with other vendor partners, with the goal of providing more adaptive prevention.
Turktrust, the Turkish certificate authority (CA) responsible for issuing an intermediate CA certificate that was later used to generate an unauthorized certificate for google.com, claims that the bad Google certificate was not used for dishonest purposes.
Over the past year, about 30,000 European banking customers were robbed of about 36 million euros -- that's about $47 million -- in an online banking scam that worked by exploiting mobile devices, according to security firms that stumbled into the operation.
Check Point is introducing four applications for its a la carte security platform that allows customers to create tailored security appliances on off-the-shelf hardware.
Intellectual Ventures, a patent portfolio developer and broker started by former Microsoft CTO Nathan Myhrvold, has filed patent lawsuits against nine tech companies, including Symantec, McAfee and Hynix Semiconductor.