Featured Posts

securebox containerization

Increasing Ransomware attacks Showcase Importance of Containerization to Secure Financial Transactions

February 20th, 2017 | By

More ransomware and IoT threats. That’s the forecast for 2017. Cyber security firms report that the number of typical malware attacks has decreased, while ransomware attacks and attacks utilizing compromised Internet of Things (IoT) devices have increased. More new typ...

MORE
zero day exploits

Top Dark Web Markets Where Zero-Day Exploits are Sold and Bought

February 14th, 2017 | By

Buying and selling zero-day exploits had been common, for many years now. Hackers who do this had been doing it in the underground Dark Web (or darknet) marketplace, like for example, the Silk Road. In the recent past, some other such marketplaces too have opened up. Here...

MORE
SSL Sniffing

Facebook More Prone to SSL Sniffing Adware After Superfish Lenovo

February 13th, 2017 | By

It was almost a year ago, late in February 2005, that laptops from PC maker Lenovo that were shipped were found to be installed with adware called “Superfish”. Following this incident, Facebook investigated the issue of SSL-sniffing software being packaged as see...

MORE
Malware

Russian Grizzly Steppe Malware Found in Burlington Electric Laptop

January 27th, 2017 | By

Reports came up recently stating that several states across the US have started reviewing cyber security as regards critical infrastructure following reports that a laptop at the Burlington Electric Department was found to be infected with malware. Reports indicated that the...

MORE
ramsomware

History of Ransomware and How Data Loss Prevention Prevents Data Breaches

January 24th, 2017 | By

Ransomware has evolved to be the most notable among cyber threats today. Since 2005, it has been the most pervasive cyber threat and the figures available today say that ransomware infections have even outnumbered data breaches in the 2005-2016 period. Two types of ransomwar...

MORE

Increase in Cyber Attacks Leads to Data Loss and Makes Data Security a Hot Career Prospect

January 11th, 2017 | By

The recent years have witnessed an unprecedented increase in the number of cyber threats and cyber security breaches, all across the world. We hear every now and then of cyber criminals hacking systems or networks, getting away with all kinds of data and playing mischief wit...

MORE
Basic Data Security

Many Retail Stores Still Lack Basic Security – How to Prevent Data Breaches

January 10th, 2017 | By

Security breaches are common in the retail industry these days. We hear of POS malware strikes and POS security breaches very frequently and now retail stores pay too much attention to data security. But ask security experts and analysts and they’d say that there are m...

MORE
Encryption Privacy

Why Privacy, Security and Encryption are given 1st priority

January 4th, 2017 | By

In nearly every online interaction sensitive personal data is involved – browsing, Facebook posts, emails, YouTube postings, etc…, There has been a drastic increase in cyber attacks by both state-sponsored and private threat actors that threaten privacy of common...

MORE
Ukrainian Artillery Data Loss

Ukrainian Artillery suffers Data Loss by Fancy Bear Hackers with the help of POS Malware

January 3rd, 2017 | By

The Ukrainian Artillery units seem to have been sitting ducks for the Russian army. Reason: Android malware. Analysis by the cyber security firm – CrowdStrike reveals that the Russian MilitaryIntelligence (GRU) had possibly had access to the location and communications of th...

MORE
Combat FlokiBot Malware

Things to be done to combat FlokiBot Malware

December 28th, 2016 | By

Reports are afloat about a POS malware named Floki Bot, a banking Trojan that’s based on Zeus, which is evolving fast in the cybercrime underground. The Floki Bot malware, as per reports, has been developed starting from the Zeus code that was leaked five years ago, in...

MORE
Page 1 of 512345