Smart Card Attacks – A Look at How Hardware Tokens are Being Exploited

Finjan TeamBlog, Cybersecurity

Finjan Smart Card Attacks   A Look at How Hardware Tokens are Being Exploited

With their embedded microchip technology and the secure authentication they can provide, smart cards or hardware tokens have been relied upon to give physical access and the go-ahead for data transfer in a multitude of applications and transactions, in the public, corporate, and government sectors. But, robust as they are, smart cards do have weaknesses – and intelligent hackers have … Read More

Access Control Systems – A Closer Look at the Bell-LaPadula Model

Finjan TeamBlog, Cybersecurity

Finjan Access Control  Systems   A Closer Look at the Bell LaPadula Model

While controlling user access to protected networks and sensitive data is important in the private sector, it’s crucial to maintaining security in government and military circles. So much so that a specific protocol was adopted for these applications. Known as the multi-level or Bell-LaPadula Model (BLM, or sometimes BLP), this access control system forms the basis of our discussion today. … Read More

Symmetric Versus Asymmetric Encryption

Finjan TeamBlog, Cybersecurity

Finjan Symmetric Versus Asymmetric Encryption

In the face of threats like data tampering, snooping, and identity theft, individuals and organizations require some means to ensure the safety of information that’s transmitted through private networks and over public channels. Encryption is one way of achieving this. On the surface, it sounds like a simple process: Take a message or document, scramble it, send it, and provide … Read More

Advanced Sandboxing in the Fight Against Cyber Threats

Finjan TeamBlog, Cybersecurity

Finjan Advanced Sandboxing in the Fight Against Cyber Threats

Some recent estimates are putting the hacking industry at three to five times the size of the market for cyber-security. So it’s fair to say that this is a profitable time to be a cybercriminal – and a productive one, too. With multitudes of files, email messages (and more importantly, email attachments) moving between individuals and organizations every day, there’s … Read More

Spoofing and How it is Used for Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Spoofing and How it is Used for Cyber Attacks

At the movies, a spoof is a comedy, masquerading as something else: An otherwise serious subject like a spy drama, crime caper, or action adventure, which is laced with self-mockery and comedic elements. It’s an effective strategy that pulls in fans of both comedy and the underlying genre that’s being parodied – and one which generates profits and pleasure for … Read More

The Destructive Impact of DDoS Attacks

Finjan TeamBlog, Cybersecurity

Let’s try to momentarily put ourselves into the mentality of an online hacker. You’ve identified a website that you want to hack, but why would you do it? Perhaps to force a ransom payment from a victim who is desperate to get their site back in action. It could be a deliberate attempt to harm a company you dislike for … Read More

Malvertising and How it’s Being Used to Launch Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Malvertising and How its Being Used to Launch Cyber Attacks

Trust and ignorance can work hand in hand to produce favorable results – from a cybercriminal’s point of view. That’s why perpetrators are turning to a disturbing new strategy for porting malware on to unsuspecting users: Visitors to reputable, high-profile websites and portals are becoming infected by malicious code that’s distributed by “malvertising“. What is Malvertising? Malvertising (a contraction for … Read More

The Past and Present State of Spyware

Finjan TeamBlog, Cybersecurity

Finjan The Past and Present State of Spyware

Say the word “spy” to most people, and they’ll probably come back with a pop culture reference like “James Bond” or “Jason Bourne”. Then go on to mention “contact lens cameras”, “micro-film” (or more likely “nano”, now), and “poison-tipped umbrellas”. But beyond popular culture, there’s a very real though shady world where spying continues to be a practice – and … Read More

A Closer Look at Offensive Network Security

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at Offensive Network Security

For years, access control measures, antivirus monitoring, intrusion detection, the detection of software bugs, and similar strategies have been the mainstay of cyber-security. These are largely passive techniques, dedicated to the defense of systems and networks. And they rely on having prior knowledge of the intruder’s methodologies and tools (such as malware and virus signature databases) to aid in detection … Read More

The Next Generation of Endpoint Security

Finjan TeamBlog, Cybersecurity

Finjan The Next Generation of Endpoint Security

Accepted wisdom is already shifting to the view that network security must go beyond the setting up of firewalls, antivirus protection, and peripheral defenses. With BYOD (Bring Your Own Device) and the rise of the mobile workforce, vulnerabilities and a proliferation of possible access points for malicious intruders are being introduced by user devices such as laptops, mobile phones, USB … Read More