Featured Posts

Verifone investigates on a Security Breach

March 15th, 2017 | By

A recent investigation on security breaches since mid-2016 was done by Verifone and was identified that the breach infected a huge number of business that used POS terminals for POS transactions However, the breach was limited to corporate network and there was no negative i...

MORE

Terdot Zloader/Zbot Performs Subtle MITM Attack

March 8th, 2017 | By

ZeuS or Zbot Trojan has been rated as a very dangerous financial malware. Zbot steals critical system information, sensitive banking details, and online credentials. Since 2011, when the source code of the ZeuS malware was leaked, many versions of the ZeuS have been develope...

MORE

Google Project Zero Security Researcher Exposes Microsoft’s Zero Day Vulnerability

March 7th, 2017 | By

Security researchers at Google’s Project Zero have now reported and exposed a Windows 10 vulnerability that Microsoft has obviously failed to patch on time… Project Zero, as we know, refers to the team of security experts and analysts who work on detecting and an...

MORE

Mitigate Zero Day Exploits through SecureBox Containerization

March 1st, 2017 | By

When applications or software are created they may have vulnerabilities. It is nearly impossible to find out all the vulnerabilities in an application, and this is an accepted fact. Considerable time and effort are required to search for vulnerabilities and even then they ma...

MORE

Increasing Ransomware attacks Showcase Importance of Containerization to Secure Financial Transactions

February 20th, 2017 | By

More ransomware and IoT threats. That’s the forecast for 2017. Cyber security firms report that the number of typical malware attacks has decreased, while ransomware attacks and attacks utilizing compromised Internet of Things (IoT) devices have increased. More new typ...

MORE

Top Dark Web Markets Where Zero-Day Exploits are Sold and Bought

February 14th, 2017 | By

Buying and selling zero-day exploits had been common, for many years now. Hackers who do this had been doing it in the underground Dark Web (or darknet) marketplace, like for example, the Silk Road. In the recent past, some other such marketplaces too have opened up. Here...

MORE

Facebook More Prone to SSL Sniffing Adware After Superfish Lenovo

February 13th, 2017 | By

It was almost a year ago, late in February 2005, that laptops from PC maker Lenovo that were shipped were found to be installed with adware called “Superfish”. Following this incident, Facebook investigated the issue of SSL-sniffing software being packaged as see...

MORE

Russian Grizzly Steppe Malware Found in Burlington Electric Laptop

January 27th, 2017 | By

Reports came up recently stating that several states across the US have started reviewing cyber security as regards critical infrastructure following reports that a laptop at the Burlington Electric Department was found to be infected with malware. Reports indicated that the...

MORE

History of Ransomware and How Data Loss Prevention Prevents Data Breaches

January 24th, 2017 | By

Ransomware has evolved to be the most notable among cyber threats today. Since 2005, it has been the most pervasive cyber threat and the figures available today say that ransomware infections have even outnumbered data breaches in the 2005-2016 period. Two types of ransomwar...

MORE

Increase in Cyber Attacks Leads to Data Loss and Makes Data Security a Hot Career Prospect

January 11th, 2017 | By

The recent years have witnessed an unprecedented increase in the number of cyber threats and cyber security breaches, all across the world. We hear every now and then of cyber criminals hacking systems or networks, getting away with all kinds of data and playing mischief wit...

MORE
Sign Up For a Free Demo

How many end users will use this secure application? (optional)