Professional Documents
Culture Documents
SECURITY
REPORT
CHECK POINT
2015 SECURITY REPORT
01 INTRODUCTION AND METHODOLOGY
04
10
18
32
40
48
56
REFERENCES 60
01
INTRODUCTION
AND METHODOLOGY
The first time you do something, its science. The
second time you do something, its engineering. 1
Clifford Stoll, astronomer, author, digital forensics pioneer
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 4
20 YEARS AGO
Invention of
Stateful
Inspection
5 YEARS AGO
NGFW
10 YEARS AGO
URL Filtering,
UTM
15 YEARS AGO
Prevalent Use
of Anti-Virus,
VPN, IPS
NOW
Threat Intelligence,
Threat Prevention,
Mobile Security
>
1988
Morris Worm
1994
1998
2003
Melissa
Anonymous
Formed
2006
WikiLeaks
2000
I Love You
2010
2020
2014
DDoS
Attacks:
Stuxnet
SCADA
IoT Everywhere
Bitcoin
2013
2007
Dragonfly
Zeus Trojan
2011
Stolen
Authentication
Information
2017
Driverless Cars
Hacked?
2012
Flame Malware
During
2014,
Check
Point
saw
significant
and Microsoft.
unknown malware.
AN AVERAGE DAY
AT AN ENTERPRISE ORGANIZATION
EVERY 24 SECONDS
a host accesses a malicious website
EVERY 34 SECONDS
an unknown malware is downloaded
EVERY 1 MINUTE
a bot communicates with its
command and control center
EVERY 5 MINUTES
a high-risk application is used
EVERY 6 MINUTES
a known malware is downloaded
EVERY 36 MINUTES
sensitive data are sent
outside the organization
1.1
The first computer viruses hit computers in the early 1980s, and essentially weve
been in a cyber arms race ever since. We design new defenses, and then hackers
and criminals design new ways to penetrate them.Weve got to be just as fast
and flexible and nimble in constantly evolving our defenses. 2
-President Barack Obama
process,
Everyone is at risk.
businesses
have
rushed
to
adopt
critical point.
METHODOLOGY
During 2014, Check Point collected event data from
Unknown Malware
Known Malware
This
Intrusion Prevention
High-Risk Applications
81%
46
Looking at the vertical markets that participated
in our research, manufacturing led the way at 46
15
12
4
MANUFACTURING
1.2
17
FINANCE
GOVERNMENT
RETAIL AND
WHOLESALE
3
TELCO
2
CONSULTING
OTHER
02
UNKNOWN MALWARE:
THE VAST UNKNOWN
Theres always the risk that there are
unknown unknowns. 6
Nate Silver, statistician, journalist
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 10
106
not
Unknown
malware
is
malware
typically
sandbox protections.
per hour.
Office files.
142M
2014
83M
2013
34M
142M
NEW MALWARE IN 2014 AND A
71% INCREASE VERSUS 2013
2012
18.5M
2011
18M
2010
12M
2009
2.1
SOURCE: AV-Test
MD5 for
originalmalware.doc
fd96b96bd956a397fbb1150f3
KNOWN MALWARE
UNKNOWN MALWARE
sensitive information.
41%
52%
web shell code into the server. The web shell is then
aware.
execute commands.
Cybercriminals
recognize
these
safeguards
IPS, ANTI-VIRUS
& ANTI-BOT
THREAT EXTRACTION
2.2
combine
the hackers.
deep
OS-
and
CPU-level
sandbox
However, a lot of
detection.
for 2015.
Seeing the file write tracks.txt in the C:\Windows\System32\ directory upheld the belief that this
file was PoS malware, designed to harvest card track data. With that knowledge, it became evident
that this malware was part of a kit that could capture credentials; use them to install malware;
move around inside; and exfiltrate data out of the network. Had Threat Emulation been deployed,
this malwareand other components in the malicious kitcould have been blocked.
RECOMMENDATIONS
To address unknown malware and zero-day
sandbox include:
threat extraction.
03
KNOWN MALWARE:
KNOWN AND DANGEROUS
Were all digital, were all vulnerable and
everythings instantso instant. Instant
success and instant failure. 9
Madonna, pop star, on the digital theft and leaking of her unfinished album, Rebel Heart,
before it was released.
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 18
TOP 5 COUNTRIES
HOSTING
MALICIOUS FILES
HOSTING
MALICIOUS SITES
DOWNLOADING
MALICIOUS FILES
ACCESSING
MALICIOUS SITES
38
38
26
PERCENT OF ORGANIZATIONS
22
17
14
3.1
O
EX
IC
EL
RA
IS
IA
D
O
IC
EX
RK
EY
IA
TU
IN
EL
IS
N
LA
RA
K
U
PO
SS
IA
E
N
AI
RU
S
U
KR
U
K
U
CE
AN
FR
AD
N
CA
IN
beyond alarming.
In 2014 hosts
downloaded malware
every 6 minutes
In 2014 hosts
accessed a malicious site
every 24 seconds
from 2012.
DDoS attacks.
activity in 2014.
advantage
83%
of
vulnerability
in
Mac
FAMILY
ATTACK COUNT
DAMAGE
ZEUS
51,848,194
GRAFTOR
21,673,764
RAMNIT
12,978,788
CONFICKER
12,357,794
SALITY
11,791,594
SMOKELOADER
9,417,333
Installs malware
RAMDO
5,771,478
Performs click-fraud
GAMARUE
3,329,930
TORPIG
3,290,148
3.2
Apples
The bot that had the most action for 2014, however,
Both
increased
significantly
from
the
previous year.
48
2014
2013
60
51
47
43
39
36
23
23
DENIAL OF
SERVICE
3.3
35
BUFFER
OVERFLOW
CODE
EXECUTION
CROSS-SITE
SCRIPTING
22
ANOMALY
19
MEMORY
CORRUPTION
HACKTIVISM:
When Protestors Take Their Ideology Online
The past year saw an upswing in DDoS against educational facilities, service providers, US state
governments and city governments. Regardless of politics, the effects of hacktivism through DDoS
attacks are felt by innocent bystanders as much, if not more than, the intended targets. In countries
where the government provides the majority of connectivity for educational services, an attack on a
small school can impact every school in the network. A DDoS targeting one citys website can cause
(and has caused) a loss of VPN connectivity with law enforcement field units and emergency
servicesand not just during a major protest.
While the order of steps may vary, there are four main techniques used by hacktivists:
1. A multi-wave volumetric attack that uses millions of user datagram protocol (UDP) packets
on port 80. As a stateless protocol, UDP is very easy to fake, making the source appear as if it was
sent from a different internet protocol (IP) address. This floods the connection before organizations
premise security devices can detect and react.
2. A domain name system (DNS) reflection attack in which attackers send millions of DNS queries
to legitimate DNS servers, using a spoofed source IP address to appear as if they originated from a
server on the victims network. The legitimate DNS servers react by flooding DNS responses to
the victim, causing another wave of volumetric attacks.
3. A SYN flood attack targets a specific host. Spoofing the source address in high volume, it consumes
enough resources so that the host is unresponsive to legitimate traffic.
4. Slow attacks open as many connections as possible to a server and keep those connections open as
long as possible by sending bits of data right before the transmission control protocol (TCP) sessions
time out. The traffic is low, but the volume of slow connections congests inbound network ports.
CRITICAL INFRASTRUCTURE
DOOMSDAY: Not If, but When
James Arbuthnot, former chairman of the UK Defense Select Committee, said it best: Our national grid is
coming under cyberattack not just day by day, but minute by minute.11 In fact, nearly 70 percent of critical
infrastructure (CI) companies suffered a security breach over the last year.12 One attack during 2014, by a
group of Russian hackers called Energetic Bear, launched a campaign that targeted oil and gas companies.
Through infection of industrial control software that those companies relied on, attackers embedded
malware that automatically downloaded and installed when the victim organizations updated their
software. This gave attackers visibility intoand potential control ofthe targeted networks.
In a separate incident, a German steel mill was targeted, causing major damage to a blast furnace.
According to the German Federal office of Information Security, BSI, attackers deployed a socially
engineered spear phishing campaign to trick specific individuals into opening messages. From there,
the cybercriminals were able to capture login names and passwords, which helped them access the
mills production network. Once in, they went after the control systems, causing elements to fail, which
prevented the furnace from shutting down normally. As a result, the whole system was impaired.
2014: BY VENDOR
TOP VULNERABILITIES AND EXPOSURES
7945
431
376
5736
5297
4155
5632
287
4651
155
138
GO
OG
L
E
RE
DH
AT
AD
OB
E
AP
PL
E
IB
M
OR
AC
M
LE
IC
RO
SO
FT
CI
SC
O
08
20
09
20
20
10
11
20
12
20
20
20
13
14
156
135
120
N
UX
M
OZ
IL
LA
5191
368
LI
NUMBER OF VULNERABILITIES
450
2013
2012
67
68
13
AN
OL
UI
LL
VI
OV
E
OB
AD
/O
SU
RO
S
IC
RA
CL
T
OF
LL
OV
E
N
SU
SQ
SQ
CA
UI
D
RA
CL
E
AP
PL
E
/O
AN
3C
OM
OL
DE
OB
T
AD
OF
LA
JO
OM
RO
S
OZ
I
IC
LL
N
SU
3.4
RA
CL
HP
/O
OB
AP E
AC
HE
OF
RO
S
M
IC
AD
15
10
DE
15
14
VI
PERCENT OF ORGANIZATIONS
77
SOURCE: Common Vulnerabilities and Exposures (CVE) Database (top charts), Check Point Software Technologies (bottom chart)
FEELING VULNERABLE
One of the big issues that organizations need to
hackers to exploit.
14
communications to servers.16
40%
SERVER
3.5
60%
CLIENT
ENTERPRISE ENDPOINT
VULNERABILITIES AND MISCONFIGURATIONS
54%
25%
20%
Hosts that do not run
desktop firewalls
35%
Hosts where user has
local admin permissions
3.6
PERCENT
OF HOSTS
25%
Hosts that do not have
updated software versions
10%
Hosts that do not have
the latest service pack
CHECK POINT
FINDING
CHECK POINT
ISSUE ANALYSIS
Anti-Spoofing not
being activated
for 75% of the
respondents
Out-of-State TCP
packets not being
dropped in 19%
of respondents
REGULATION
COUNTRIES IMPACTED
BY THIS REGULATION
Globalany company
processing or storing
credit card data
NIST 800:41
Mainly relevant to US
Federal, but equally
applicable to any US
company adopting a
robust firewall standard
ISO 27001
Globalany company
being certified to this
standard or adopting it
as a best practice
Globalany company
processing or storing
credit card data
NIST 800:41
Mainly relevant to US
Federal, but equally
applicable to any US
company adopting a
robust firewall standard
ISO 27001
Globalany company
following this standard
Globalany company
processing or storing
credit card data
ISO 27001
Globalany company
being certified to this
standard or adopting
it as a best practice
Inter-Department Compartmentalization
In large organizations, we often observe a common theme of information compartmentalization and,
sometimes, finger pointing between departments. In its most innocent form, some companies lack
internal information-sharing mechanisms or consistent IT policies; this results in one group having
a much more modern network than another. Unfortunately, many are not segmented internally so
a breach for one can result in a breach for all.
RECOMMENDATIONS
You would think that if something is known, it would
is misguided.
applications.
distributors of malware.
be installed on endpoints.
04
MOBILE SECURITY:
DONT FENCE ME IN
Apart from the known and the unknown,
what else is there? 18
Harold Pinter, Nobel Prize-winning playwright, screenwriter, director, actor
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 32
42%
INTELLECTUAL
PROPERTY
NETWORK
CREDENTIALS
PRIVILEGED
COMMUNICATION
|
|
4.1
EMPLOYEE
LOCATION
CALLS
OUT OF CONTROL
Among those surveyed, 91 percent have seen an
21
72
SECURING CORPORATE
INFORMATION
67
59
46
42
OTHER
4.2
PERCENT OF ORGANIZATIONS
Infections
Approximately 1,000 devices infected: 60% Android, 40% iOS.
Malware
More than 20 variants and 18 different mRAT product families found.
Risk
Corporate data in the form of emails, messages, keystrokes, calls,
employee location.
to their organization.
Interestingly,
employees
of
researchers
discovered
corporations
are
targeted
that
by
cited BlackBerry.
Others
TalkLog
MobiStealth
My Mobile Watchdog
Shadow Copy
Mspy
Mobile Spy
Bosspy
Spy2Mobile
4.3
photos.
22
RECOMMENDATIONS
Dont Rely on MDM as a Catch-All
Establish
threat is removed.
secure
business
environment,
Thwart Threats
the data.
security perimeter.
What we are seeing with technologies like mobile devices and cloud computing
is that they are enabling business models that simply didnt exist before.
Giants everywhere are ripe for disruption by new businesses that understand
how to use technology to create a brand new, never-before-possible value
proposition for its customers. 23
-Eric Schmidt, chairman of Google
05
APPLICATIONS:
GETTING YOU WHERE
IT HURTS
As our society tips toward one based on data,
our collective decisions around how that data
can be used will determine what kind of a
culture we live in. 24
John Battelle, entrepreneur, author, journalist
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 40
96%
Admin
Toolsapplications
like
or real-time communication.
92
2013
2012
90
81
86
86
80
77
75
61
62
PERCENT OF ORGANIZATIONS
56
43
REMOTE ADMIN
5.1
ANONYMIZER
to minimize risk, but all too often, they are used for
malicious purposes.
And while the top three vectors of each major
In 2014, remote admin tools (RATs) led the list of
category
of
high-risk
applications
remained
reporting incidents.
Wheres Waldo?
Whether breaching for financial gain or hacking to make a point, attackers have several tools at their
disposal to mask their location and identities. And contrary to what Hollywood may portray, tracing and
identifying the criminals is very complex.
Cybercrime investigators admit that they are only catching the bottom of the food chain when it comes to
computer crime. Thats because criminal enterprises managed by informed and experienced attackers are
likely to go undetected. Given that they are geographically distributed, well-structured and compartmented,
affiliated hackers only know a small part of the larger organizationfurther minimizing the exposure to the
criminal organization.
In operating under the radar, cybercriminals employ a host of tools to maintain their anonymity. It starts
with erasing the internet trail back to their source location. The most basic tool for this is a web proxy.
Also called anonymizers, a proxy server acts as an intermediary client computer, redirecting requests
to the ultimately desired destination. In the early days of the internet, web proxies helped conceal a
sources IP address, but today are more easily countered and traced.
2014
AMERICAS
Hola
ANONYMIZER
Tor
FILE STORAGE
AND SHARING
Dropbox Hightail
Windows Live Office
RDP
LogMeIn
TeamViewer
APAC
OpenVPN Coralcdn
Proxy Suppliers
Coralcdn
REMOTE ADMIN
EMEA
BitTorrent Protocol
iMesh
Dropbox
TeamViewer
SoulSeek
OpenVPN
Tor
Hightail
Jalbum
Dropbox
RDP
LogMeIn
TeamViewer
Coralcdn
Hightail
Mendeley
RDP
LogMeIn
2013
ANONYMIZER
Tor
Ultrasurf
OpenVPN Coralcdn
Proxy Suppliers
Hotspot Shield
FILE STORAGE
AND SHARING
Dropbox
Dropbox
REMOTE ADMIN
RDP
5.2
LogMeIn
TeamViewer
RDP
TeamViewer
LogMeIn
Ultrasurf
Tor
Hide My Ass
BitTorrent Protocol
SoulSeek
Dropbox
Xunlei
TeamViewer
RDP
LogMeIn
Organizations experienced
12.7 high-risk application events
per hour, 305 times per day
Hide My Ass was nowhere to be seen. Likely,
communications
anonymizers
private.
have
Meanwhile,
climbed
other
tremendously
in
TOP REMOTE
ADMINISTRATION
APPLICATIONS
2014
78
2014
2013
84
85
2012
2014
PERCENT OF ORGANIZATIONS
69
69
60
51
48
43
24
21
14 14
11 11
16 15 14
22
14 13
DO
W
S
IN
RE
N
UL T
SE
E
XU K
N
LE
IM I
E
ED SH
ON
KE
Y
SO
BI
TT
OR
R
LO DP
GM
EI
N
AM
M
VN
Y
Y
C
RE
M GO ADM
OT T
ES OA IN
UP SS
PO IST
RT -
VI
EW
ER
AM
26
5.3
DR
OP
HI BO
X
G
LI H
VE TA
I
O L
M FFI
EN C
IM D E
AG EL
EV EY
EN
JA UE
L
W
BU
IN
M
D
HI OW D
GH S RO
TA LIV PB
IL E
O
(Y OF X
OU FI
C
S
E
SU EN
GA DIT
IM R
)
AG SY
EV NC
M EN
EN U
W
DE E
IN
LE
DO
Y
HI
GH WS DRO
TA LIV PB
IL E
O
(Y OF X
OU F
SE ICE
M ND
EN IT
SU DE )
G L
IM AR EY
AG SY
EV NC
EN
UE
13 12
11
12 11
TE
20
MOST POPULAR
ANONYMIZER APPLICATIONS
2014
2013
USAGE OF ANONYMIZER
APPLICATIONS BY REGION
2014
2012
2013
2012
64
63
59
58
54
54
PERCENT OF ORGANIZATIONS
49
49
40
35
23
19
23
18
17 17
15 14
12 10 10
T
UL
TR OR
A
HI
S
DE UR
M F
Y
OP ASS
EN
VP
N
LA
HO
UL
T
TR OR
HI ASU
DE
R
M F
Y
A
OP SS
EN
CO VP
RA N
LC
DN
OP
EN
CO VP
RA N
LC
PR
DN
OX
Y
SU
T
PP OR
LI
ER
S
AMERICAS
5.4
EMEA
APAC
RECOMMENDATIONS
While malwareboth known and unknowncan
of regulation.
2. Standardize
on
trusted,
enterprise-grade
06
DATA LOSS:
LIKE SAND THROUGH
THE HOUR GLASS
Mistakes are a fact of life. It is the response
to the error that counts. 26
Nikki Giovanni, poet, writer, educator, and activist
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 48
Organizations suffered a
data loss at a rate of 1.7 times per hour,
41 times per day
Breaches arent the only way that the bad guys get
last year.
2013
2012
PROPRIETARY
INFORMATION
41%
35%
24%
30%
29%
29%
BUSINESS DATA
RECORDS
20%
21%
6%
SENSITIVE PERSONAL
INFORMATION
25%
22%
SALARY INFORMATION
13%
14%
NETWORK
INFORMATION
13%
14%
PASSWORDPROTECTED FILES
10%
10%
14%
CONFIDENTIAL
OUTLOOK MESSAGE
5%
5%
7%
BANK ACCOUNT
NUMBERS
5%
4%
3%
OTHER
27%
31%
21%
6.1
13%
their costs.
VISA
DEBIT
PLATINUM
10/17
Yes
101
411773
VISA
DEBIT
PLATINUM
10/17
Yes
101
432388
VISA
DEBIT
PLATINUM
05/15
Yes
101
432388
VISA
DEBIT
PLATINUM
05/15
Yes
101
414548
VISA
DEBIT
BUSINESS
05/16
Yes
101
414548
VISA
DEBIT
BUSINESS
05/16
Yes
101
486831
VISA
DEBIT
PLATINUM
04/17
Yes
101
486831
VISA
DEBIT
PLATINUM
04/17
Yes
101
448055
VISA
DEBIT
CLASSIC
01/16
Yes
101
448055
VISA
DEBIT
CLASSIC
01/16
Yes
101
414709
VISA
CREDIT
SIGNATURE
10/16
Yes
101
414709
VISA
CREDIT
SIGNATURE
10/16
Yes
101
United States, NY
Rochester, 14623
BANK OF AMERICA
N.A.
American Sanctions 1
United States, NY
Rochester, 14623
United States, IA
Bettendorf, 52722
BANK OF AMERICA
N.A.
WELLS FARGO
N.A.
American Sanctions 1
United States, IA
Bettendorf, 52722
United States, PA
Hanover, 17331
WELLS FARGO
N.A.
MEMBERS 1ST F.C.U.
American Sanctions 1
United States, PA
Hanover, 17331
United States, CO
Littleton, 80129
American Sanctions 1
WELLS FARGO
N.A.
American Sanctions 1
United States, CO
Littleton, 80129
United States, WI
Green Bay, 54303
WELLS FARGO
N.A.
ITS BANK
American Sanctions 1
American Sanctions 1
American Sanctions 1
American Sanctions 1
United States, WI
Green Bay, 54303
United States, CA
Mission Viejo, 92692
ITS BANK
American Sanctions 1
American Sanctions 1
United States, CA
Mission Viejo, 92692
American Sanctions 1
52.5$
52.5$
52.5$
52.5$
52.5$
52.5$
52.5$
52.5$
22.5$
+
+
+
+
+
+
+
+
+
42.01$
+
+
42.01$
22.5$
PERCENT OF ORGANIZATIONS
2014
82
2013
2012
88
86
88
87
78
78
79
70
61
50
MANUFACTURING
45
FINANCE
TELCO
GOVERNMENT
6.2
EASY MONEY
Like hunters looking for easy prey, cybercriminals
If you were tuned into the media during the past year,
the world, but the United States leads the way with
RECOMMENDATIONS
Remember that security does not stand still. When
and balances.
help reinforce.
07
CONCLUSION AND
RECOMMENDATIONS:
THE PATH TO PROTECTION
Status quo, you know, is Latin
for the mess were in. 30
Ronald Reagan, actor and former President of the United States
CHECK
INTRODUCTION
POINT - 2015AND
SECURITY
METHODOLOGY
REPORT | 56
security process.
interconnected levels.
Check
Point
recommends
threat
prevention
that includes:
Enforcement Layer
Threat
extraction
to
reconstruct
incoming
evasion techniques.
Control Layer
Establish
administrator-determined
security
for threats.
Management Layer
privilege guidelines.
independently
and
proactively
distributes
new
WHAT NEXT?
As mobile devices become, increasingly, primary
to accelerate.
is essential.
By
understanding
potential
threats
and
33
Analyst
34
REFERENCES
1
Obama, Barack. The Cybersecurity and Consumer Protection Summit. February 13, 2015.
AV-Test. http://www.av-test.org/en/statistics/malware/
Lacy, Sarah. The Irony of the Social Media Era: It Was Created By the Worlds Least Social People.
Huffington Post, July 15, 2012. http://www.huffingtonpost.com/sarah-lacy/social-media-entrepreneursmark-zuckerberg_b_1518471.html
Amira, Dan. Q&A With Nate Silver on His New Book, Whether Romney Has a Shot, and Why He
Doesnt Play Fantasy Baseball Anymore. New York Magazine, September 28, 2012.
http://nymag.com/daily/intelligencer/2012/09/nate-silver-book-signal-noise-interview.html
Check Point Software Technologies. The Unknown 300 Test Report, 2014.
https://www.checkpoint.com/downloads/300TestReport.pdf
Pareles, Jon. Madonna on Rebel Heart, Her Fall and More. The New York Times, March 5, 2015.
http://nyti.ms/1A29332
10
11 Ward, Jillian. Power Network Under Cyber-Attack Sees U.K. Increase Defenses, Bloomberg Business,
vendors.php?year=2014
14 Kirk, Jeremy. An SDN vulnerability forced OpenDaylight to focus on security, CSO, March 25, 2015.
http://www.csoonline.com/article/2902902/vulnerabilities/an-sdn-vulnerability-forced-opendaylightto-focus-on-security.html
15 Reilly, Claire and Musil, Steven. CNET, September 24, 2014.
http://www.cnet.com/news/bigger-than-heartbleed-bash-bug-could-leave-it-systems-shellshocked/
16 Gilbert, David. What is POODLE? The Latest Online Security Threat After Shellshock and Heartbleed,
REFERENCES | 60
17 Singh, Anita. Hay Festival 2012: Salman Rushdie on security and The Satanic Verses, The Telegraph,
http://www.eweek.com/developer/ibm-study-shows-mobile-app-developers-neglecting-security.html
22 Schroeder, Stan. Android Malware Spies on You Even After Phone Is Shut Down, Mashable,
http://teachers.smithsonian.com/science-nature/opening-strange-portals-in-physics-92901090/?all
26 Giovanni, Nikki. Black Feeling, Black Talk, Black Judgment, 1970.
27 United States Computer Emergency Readiness Team. US-CERT, August 27, 2014.
https://www.us-cert.gov/ncas/alerts/TA14-212A
28 LexisNexis. 2014 LexisNexis True Cost of FraudSM Study.
http://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2014.pdf
29 Schwartz, Larry. Joyner Kersee Completes Huge Leap, ESPN.com.
https://espn.go.com/sportscentury/features/00016055.html
30 Reagan, Ronald. Address Before a Joint Session of the Tennessee State Legislature in Nashville,
http://money.cnn.com/2014/07/02/technology/security/russian-hackers/
REFERENCES | 61
32 Vijayan, Jai. Rush To Release Resulting In Vulnerable Mobile Apps, Dark Reading, March 20, 2015.
http://www.darkreading.com/attacks-breaches/rush-to-release-resulting-in-vulnerable-mobileapps/d/d-id/1319566
33 ABI Research. Wearable Computing Devices, Like Apples iWatch, Will Exceed 485 Million Annual
2014. http://www.techweekeurope.co.uk/e-innovation/internet-of-things-4-9bn-gartner-155298
35 Iger, Bob. Disney Shareholder Meeting, Anaheim, NBC News, March 3, 2006.
http://www.nbcnews.com/id/11767409/ns/business-us_business/t/pixars-star-disneyshareholders-meeting/#.VSRlovnF9Zt
REFERENCES | 62
Worldwide Headquarters
5 HaSolelim Street, Tel Aviv 67897, Israel
Tel: 972-3-753-4555 | Fax: 972-3-624-1100
Email: info@checkpoint.com
U.S. Headquarters
959 Skyway Road, Suite 300, San Carlos, CA 94070
Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233
www.checkpoint.com