Breaches continue to occur regardless of existing tools. In Feb 2017, a hack compromised the account details of more than 2.5 million PlayStation and Xbox users. The data breach happened in 2015 but was only found out this year. Lack of visibility and endpoint security controls contributes to security breaches and financial loss. A combination […]

Read More →

Ransomware was a popular topic in 2016. Ransomware attacks have become complex, targeted, and sophisticated. Many organizations infected with ransomware have lost a huge amount of money to get back their data from attackers. In 2016, new ransomware and new variants of old ransomware showed up. This infographic shows some of the worst ransomware of […]

Read More →

Weak Password: Access Granted The world saw two major hacks recently – Yahoo and LinkedIn. While LinkedIn compromised 117 million passwords, Yahoo compromised 200 million passwords. People tend to reuse their passwords. Thus, hackers are more likely to gain access to people’s email and bank accounts. Password security is one of the fundamental practices of […]

Read More →

USB Scam: An Unsuspicious Attack in Action Security researchers Karsten Nohl and Jakob Lell at the Black Hat security conference demonstrated how the security of USB devices has been destroyed and how it’s possible to infect any USB device using a hidden or unknown malware. They used the malware which they created called the BadUSB […]

Read More →

Ransomware continues to be popular among cyber criminals. According to a CNN report, cyber criminals collected over $209 million in the first three months of 2016. Ransomware exploits vulnerabilities, misconfigurations, and social engineering. Our most loved whitepaper Ransomware a Billion Dollars a Year Cyber Crime covers ransomware variants and how these variants exploit endpoints. The […]

Read More →

The Dangers of Drive-By Download Attack Drive-by-downloads are harmful pieces of software that are downloaded to an endpoint device as a result of visiting a compromised web page or an HTML-based email that links to a website. This attack occurs without the consent or knowledge of the user. Users mainly become a victim to the […]

Read More →