Featured Posts

Zero Day Attack

Zero-Day DoubleAgent Turns Antivirus Into Malware

April 3rd, 2017 | By

A new Zero-Day attack that is capable of taking full control over antivirus software has been disclosed by Cybellum, an Israel-based security firm. Dubbed “DoubleAgent”, it is a zero-day attack that first hijacks the antivirus software and then uses the same soft...

MORE

New MajikPOS Malware Infects Point of Sale (POS) System

March 31st, 2017 | By

A new kind of point-of-sale (POS) malware is presently active across North America and Canada. Dubbed by cyber security experts as MajikPOS Malware, it is a variant of FastPOS and ModPOS – POS data stealing malware. Since January 2017 it is believed to have stolen data...

MORE

Key Strategies to Secure Business from Data Breaches

March 20th, 2017 | By

Restaurant and Retailers are consistently harassed by cyber threats. Some of the top-notch businesses to mention are Target, Wendy’s and such brands have been the main targets of such humongous security breaches leaving the customer’s critical data at risk. Busin...

MORE

Verifone investigates on a Security Breach

March 15th, 2017 | By

A recent investigation on security breaches since mid-2016 was done by Verifone and was identified that the breach infected a huge number of business that used POS terminals for POS transactions However, the breach was limited to corporate network and there was no negative i...

MORE

Terdot Zloader/Zbot Performs Subtle MITM Attack

March 8th, 2017 | By

ZeuS or Zbot Trojan has been rated as a very dangerous financial malware. Zbot steals critical system information, sensitive banking details, and online credentials. Since 2011, when the source code of the ZeuS malware was leaked, many versions of the ZeuS have been develope...

MORE

Google Project Zero Security Researcher Exposes Microsoft’s Zero Day Vulnerability

March 7th, 2017 | By

Security researchers at Google’s Project Zero have now reported and exposed a Windows 10 vulnerability that Microsoft has obviously failed to patch on time… Project Zero, as we know, refers to the team of security experts and analysts who work on detecting and an...

MORE

Mitigate Zero Day Exploits through SecureBox Containerization

March 1st, 2017 | By

When applications or software are created they may have vulnerabilities. It is nearly impossible to find out all the vulnerabilities in an application, and this is an accepted fact. Considerable time and effort are required to search for vulnerabilities and even then they ma...

MORE

Increasing Ransomware attacks Showcase Importance of Containerization to Secure Financial Transactions

February 20th, 2017 | By

More ransomware and IoT threats. That’s the forecast for 2017. Cyber security firms report that the number of typical malware attacks has decreased, while ransomware attacks and attacks utilizing compromised Internet of Things (IoT) devices have increased. More new typ...

MORE

Top Dark Web Markets Where Zero-Day Exploits are Sold and Bought

February 14th, 2017 | By

Buying and selling zero-day exploits had been common, for many years now. Hackers who do this had been doing it in the underground Dark Web (or darknet) marketplace, like for example, the Silk Road. In the recent past, some other such marketplaces too have opened up. Here...

MORE

Facebook More Prone to SSL Sniffing Adware After Superfish Lenovo

February 13th, 2017 | By

It was almost a year ago, late in February 2005, that laptops from PC maker Lenovo that were shipped were found to be installed with adware called “Superfish”. Following this incident, Facebook investigated the issue of SSL-sniffing software being packaged as see...

MORE
Page 1 of 512345