Breaches continue to occur regardless of existing tools. In Feb 2017, a hack compromised the account details of more than 2.5 million PlayStation and Xbox users. The data breach happened in 2015 but was only found out this year. Lack of visibility and endpoint security controls contributes to security breaches and financial loss. A combination […]

Read More →

Weak Password: Access Granted The world saw two major hacks recently – Yahoo and LinkedIn. While LinkedIn compromised 117 million passwords, Yahoo compromised 200 million passwords. People tend to reuse their passwords. Thus, hackers are more likely to gain access to people’s email and bank accounts. Password security is one of the fundamental practices of […]

Read More →

USB Scam: An Unsuspicious Attack in Action Security researchers Karsten Nohl and Jakob Lell at the Black Hat security conference demonstrated how the security of USB devices has been destroyed and how it’s possible to infect any USB device using a hidden or unknown malware. They used the malware which they created called the BadUSB […]

Read More →

Ransomware continues to be popular among cyber criminals. According to a CNN report, cyber criminals collected over $209 million in the first three months of 2016. Ransomware exploits vulnerabilities, misconfigurations, and social engineering. Our most loved whitepaper Ransomware a Billion Dollars a Year Cyber Crime covers ransomware variants and how these variants exploit endpoints. The […]

Read More →

The Dangers of Drive-By Download Attack Drive-by-downloads are harmful pieces of software that are downloaded to an endpoint device as a result of visiting a compromised web page or an HTML-based email that links to a website. This attack occurs without the consent or knowledge of the user. Users mainly become a victim to the […]

Read More →

The Great Perils of FPhishing Every year, many organizations fall victim to phishing attacks. Tens of millions of phishing emails make it to your inbox and are clicked and opened. A recent study by the Anti-Phishing Working Group (APWG) has revealed just how much we have been victim to phishing over the years. The study […]

Read More →

Today’s sophisticated and complex malware targets all industries, and healthcare industry is becoming a popular choice amongst attackers. Healthcare organizations should have another look at their cyber security structure around endpoint devices like laptops, tablets, desktops, smartphones, patient control and monitoring devices. A recent survey on healthcare security with respondents comprising healthcare organizations stated that […]

Read More →