Category

Google Project Zero Security Researcher Exposes Microsoft’s Zero Day Vulnerability

March 7th, 2017 | By

Security researchers at Google’s Project Zero have now reported and exposed a Windows 10 vulnerability that Microsoft has obviously failed to patch on time… Project Zero, as we know, refers to the team of security experts and analysts who work on detecting and an...

MORE

Mitigate Zero Day Exploits through SecureBox Containerization

March 1st, 2017 | By

When applications or software are created they may have vulnerabilities. It is nearly impossible to find out all the vulnerabilities in an application, and this is an accepted fact. Considerable time and effort are required to search for vulnerabilities and even then they ma...

MORE

Increasing Ransomware attacks Showcase Importance of Containerization to Secure Financial Transactions

February 20th, 2017 | By

More ransomware and IoT threats. That’s the forecast for 2017. Cyber security firms report that the number of typical malware attacks has decreased, while ransomware attacks and attacks utilizing compromised Internet of Things (IoT) devices have increased. More new typ...

MORE
Encryption Privacy

Why Privacy, Security and Encryption are given 1st priority

January 4th, 2017 | By

In nearly every online interaction sensitive personal data is involved – browsing, Facebook posts, emails, YouTube postings, etc…, There has been a drastic increase in cyber attacks by both state-sponsored and private threat actors that threaten the privacy and d...

MORE
Ukrainian Artillery Data Loss

Ukrainian Artillery suffers Data Loss by Fancy Bear Hackers with the help of POS Malware

January 3rd, 2017 | By

The Ukrainian Artillery units seem to have been sitting ducks for the Russian army. Reason: Android malware. Analysis by the cyber security firm – CrowdStrike reveals that the Russian MilitaryIntelligence (GRU) had possibly had access to the location and communications of th...

MORE
POS Security

Ransomware – The Leading Threat to Cyber Security In 2016

August 30th, 2016 | By

The deadly ransomware is evolving, becoming more sophisticated and more deadly, more frequent,and spreading far and wide attacking servers, work stations, laptops, smartphones and other mobile devices. It’s business model is changing too, it is being offered as “...

MORE
Sign Up For a Free Demo

How many end users will use this secure application? (optional)