The Loapi Mining Trojan

Finjan TeamBlog, Cybersecurity

Finjan The Loapi Mining Trojan

Though its reputation has taken a battering in recent months over allegations of involvement in long-term spying or extreme surveillance operations conducted against agencies of the U.S. government, the Russia-based security firm Kaspersky Lab has recently made the news for more positive reasons. Researchers at Kaspersky have discovered a Trojan named Loapi – a resourceful and potentially deadly piece of … Read More

Advantages of Cryptocurrency

Finjan TeamBlog, Cybersecurity

Finjan Advantages of Cryptocurrency

Having emerged as a digital alternative to more traditional methods of exchange like cash or credit cards, cryptographic or cryptocurrencies have also generated alternative points of view. On the one hand, there’s the school of thought which sees cryptocurrencies as a financial medium for fraudsters, terrorists, and criminals – especially given their involvement in ransomware scams, and in trading on … Read More

What Does Net Neutrality Mean for Your Privacy?

Finjan TeamBlog, Cybersecurity

Finjan What Does Net Neutrality Mean for Your Privacy?

In its purest form, net neutrality is the principle that all data on the internet should be treated equally by Internet Service Providers (ISPs), government bodies regulating internet access, and all entities concerned with the movement and management of data over the internet, generally. This idea considers internet access provision to be a public utility, much like water or electricity … Read More

Home DNA Tests Could Be Gathering Your Personal Info! A Discussion of Genetic Testing Privacy Issues

Finjan TeamBlog, Cybersecurity

Finjan Home DNA Tests Could Be Gathering Your Personal Info!  A Discussion of Genetic Testing Privacy Issues

Privacy concerns and worries about the handling of information gathered from consumers by mobile apps, websites, and online resources have been very much in the news, of late. But with the holiday season upon us – and with many people having excess time on their hands and/or memorable festive gifts to shop for – there’s an unusual new avenue which … Read More

Hardware Encryption – How is the Market Emerging?

Finjan TeamBlog, Cybersecurity

Finjan Hardware Encryption – How is the Market Emerging?

Privacy and information security concerns have fueled the increased usage in recent years of data encryption. Much of the focus of this activity – and most of the forms in which the related technology has been distributed and implemented – has been on desktop software, mobile applications, and network/system processes. But hardware-based encryption methods and technologies do exist – and … Read More

The State of VPN in China – Apple Pulls VPN Apps From China App Store

Finjan TeamBlog, Cybersecurity

Finjan The State of VPN in China   Apple Pulls VPN Apps From China App Store

To bypass censorship rules and other restrictions placed on internet usage, citizens must resort to Virtual Private Network or VPN applications and services in certain countries. Prominent among these nations is the People’s Republic of China, which not only has a long-standing history of online censorship but also an ongoing policy of proactive intervention when new avenues or technologies emerge … Read More

Email Spoofing – How SPF, DMARC and DKIM Help Detect and Prevent Attacks

Finjan TeamBlog, Cybersecurity

Finjan Email Spoofing   How SPF, DMARC and DKIM Help Detect and Prevent Attacks

As email remains one of the primary communications channels for private individuals, commercial or non-commercial organizations, and government institutions, it’s little wonder that it also continues to be a medium of choice for hackers and cyber-criminals. Two of their preferred attack methods are impersonation and fraud – both of which may be readily accomplished by spoofing the internet domains associated … Read More

How to Avoid a Slack Attack

Finjan TeamBlog, Cybersecurity

Finjan How to Avoid a Slack Attack

Email is still the primary medium of communication between individuals, businesses, and organizations – so it’s hardly surprising that cyber-criminals look to email as their major channel for conducting phishing and social media scams, or distributing malicious software such as ransomware. It’s been estimated that the world will have to foot the bill for $6 trillion annually, by 2021 – … Read More

The Power of the Botnet

Finjan TeamBlog, Cybersecurity

Finjan The Power of the Botnet

With the advances in digital technology and the quantum leap in connection speeds of recent years, we’ve become accustomed to logging into our accounts or visiting our favorite haunts on the web, with minimal fuss or incident. And if there’s a delay or hiccup in reaching these services, we’re more inclined to blame the software or the service provider, rather … Read More

KRACK Wi-Fi Vulnerability

Finjan TeamBlog, Cybersecurity

Finjan KRACK Wi Fi Vulnerability

Accepted as the current standard for the secure encryption of Wi-Fi networks, Wi-Fi Protected Access 2 or WPA2 has for some time been the automatic choice for users wishing to set up a wireless access point that’s free from the threat of eavesdroppers. But as with all things in the digital realm, evolving methods and technologies can and do conspire … Read More