Category

Cyber Security

The Changing Cybersecurity Landscape- An Overview

April 21st, 2018 | By

In recent times, there has been a sudden spike in the number and sophistication of cyber attacks globally. Due to this, cybersecurity experts have adopted various new technologies to combat Trojans, Ransomware, and other types of Malware. Infamous ransomware attacks like the...

MORE
Zero day attacks prevention

What are Zero Day Attacks and How To Prevent Zero Day Attacks?

April 14th, 2018 | By

Zero-day attacks take advantage of a previously unknown vulnerability in an application or Web service that has not been addressed or patched by the creators of that application or Web service. Since the zero-day vulnerability is previously not known, the zero-day exploits o...

MORE
Zero Day Attack

Protect Your POS Systems Against Zero-Day Attacks

March 16th, 2018 | By

It’s a well-known fact that POS (Point Of Sale) systems are vulnerable to security attacks. So if POS systems are not protected well using the right kind of security tools, enterprises which employ them, and above all, the data present within those POS systems will be...

MORE
Cyber Security

Can Cyber Crime be Prevented?

July 21st, 2017 | By

Cyber crime is hitting the headlines frequently with various malware affecting our daily lives. But unfortunately, there’s very little we can do about it at the moment. Except be crippled by it and come to a standstill. The recent WannaCry ransomware wave of attacks pr...

MORE
Banking POS Malware

Zero-Day DoubleAgent Turns Antivirus Into Malware

April 3rd, 2017 | By

A new Zero-Day attack that is capable of taking full control over antivirus software has been disclosed by Cybellum, an Israel-based security firm. Dubbed “DoubleAgent”, it is a zero-day attack that first hijacks the antivirus software and then uses the same soft...

MORE

Terdot Zloader/Zbot Performs Subtle MITM Attack

March 8th, 2017 | By

ZeuS or Zbot Trojan has been rated as a very dangerous financial malware. Zbot steals critical system information, sensitive banking details, and online credentials. Since 2011, when the source code of the ZeuS malware was leaked, many versions of the ZeuS have been develope...

MORE

Google Project Zero Security Researcher Exposes Microsoft’s Zero Day Vulnerability

March 7th, 2017 | By

Security researchers at Google’s Project Zero have now reported and exposed a Windows 10 vulnerability that Microsoft has obviously failed to patch on time… Project Zero, as we know, refers to the team of security experts and analysts who work on detecting and an...

MORE

Mitigate Zero Day Exploits through SecureBox Containerization

March 1st, 2017 | By

When applications or software are created they may have vulnerabilities. It is nearly impossible to find out all the vulnerabilities in an application, and this is an accepted fact. Considerable time and effort are required to search for vulnerabilities and even then they ma...

MORE

Increasing Ransomware attacks Showcase Importance of Containerization to Secure Financial Transactions

February 20th, 2017 | By

More ransomware and IoT threats. That’s the forecast for 2017. Cyber security firms report that the number of typical malware attacks has decreased, while ransomware attacks and attacks utilizing compromised Internet of Things (IoT) devices have increased. More new typ...

MORE
Encryption Privacy

Why Privacy, Security and Encryption are given 1st priority

January 4th, 2017 | By

In nearly every online interaction sensitive personal data is involved – browsing, Facebook posts, emails, YouTube postings, etc…, There has been a drastic increase in cyber attacks by both state-sponsored and private threat actors that threaten privacy of common...

MORE
Page 1 of 212