Podcast (cp_pod): Download
This podcast is produced by P.I. Media for Check Point.
פודקאסטים מרתקים במגוון תחומים
Podcast (cp_pod): Download
A new kind of man-in-the-middle attack is emerging, and it may just be the most lucrative method of hacking ever conceived.
This podcast is produced by P.I. Media for Check Point.
Podcast (cp_pod): Download
The first publicized case of Coronavirus in the United States occurred in late February, 2020. Almost immediately, a different spread began: hackers, leveraging the global panic to spread new kinds of malicious cyber threats. Whether the new, COVID-related malware succeeded would depend on one question: does fear and uncertainty make us more hackable?
This podcast is produced by P.I. Media for Check Point.
Podcast (cp_pod): Download
Phishing is the oldest trick in the book—we're all familiar with it by now. Yet for the past few years, Canadian companies had been falling victim to an ordinary phishing campaign. What made this threat different?
This podcast is produced by P.I. Media for Check Point.
Podcast (cp_pod): Download
It began with a "Google" security email. But the trail of breadcrumbs traced back to something much, much bigger: a laser-targeted hacking campaign that put its targets' lives in danger.
This podcast is produced by P.I. Media for Check Point.
Podcast (cp_pod): Download
Last year, iOS, Zynga, Facebook and Capital One were hacked. Personal information from over a billion people were exposed in data breaches, and new kinds of attacks we've hardly seen before came to dominate.cyberspace. Check Point reviews the biggest trends, events and stories of the past year in its annual report, out now.
This podcast is produced by P.I. Media for Check Point.
Podcast (cp_pod): Download
The world's premier cyber espionage agency built one of the world's most advanced cyber tools. When it was leaked, most of the security sector was stunned. Hidden away at the other end of the world, however, a worthy adversary had already deployed the same attack tool. How'd they got their hands on it? And who's been spying on whom this whole time?
This podcast is produced by P.I. Media for Check Point.
Podcast (cp_pod): Download
What happens if a single baby monitor can be hacked? Powerful ransomware has caused outages in hospitals across the world, putting thousands of lives in danger. Medical devices–insulin injectors, heart monitors, pacemakers–are the next targets.
This podcast is produced by P.I. Media for Check Point.
In 2015, Khalifa Haftar–a fierce military general, known as "Libya's most potent warlord"–began an operation to take over the state of Libya. He led an insurgent army, slowly taking over the country's southern lands, headed straight for the capital of Tripoli. All the while, 'Khalifa Haftar' on Facebook was publishing updates about the war, even top-secret documents, to thousands of fans.
Why was one of the world's most significant military leaders posting classified documents to Facebook? He wasn't, of course. But what was actually going on was just as strange.