How will GDPR Affect Social Media Marketing?

Finjan TeamBlog, Cybersecurity

Finjan How will GDPR Affect Social Media Marketing?

The May 25th, 2018 deadline for its formal introduction has passed and organizations across the globe are scrambling frantically to ensure that they’re prepared to meet the demanding terms of the European Union’s (EU’s) General Data Protection Regulation or GDPR. It’s a legal and compliance framework designed to safeguard the privacy and data rights of EU citizens and residents – … Read More

Browser Extension Sniffers – How Do Bad Actors Use Them?

Finjan TeamBlog, Cybersecurity

Finjan Browser Extension Sniffers   How Do Bad Actors Use Them?

Web browser extensions are those little applets you can add to your Firefox, Chrome, Edge/Internet Explorer or other desktop, to increase the functionality of the main program, and spice up your online experience in any number of ways. For the desktop browser environment, extensions are pretty much the equivalent to mobile apps. In fact, many of them also come in … Read More

How Honeytokens Are Used To Track Cybercriminals

Finjan TeamBlog, Cybersecurity

Finjan How Honeytokens Are Used To Track Cybercriminals

Proactive methods of cyber-defense, including the use of “honeytokens”, have been growing in popularity recently, as commercial and other organizations seek ways of “bringing the fight” to hackers and cyber-criminals, rather than just sitting back and waiting for something to happen. Ironically, one of those ways involves just that: Sitting back and waiting for something to happen – but only … Read More

How Changing DNS Can Speed Up Your Computer or Mobile Device

Finjan TeamBlog, Cybersecurity

Finjan How Changing DNS Can Speed Up Your Computer or Mobile Device

With Net Neutrality gone, and privacy issues very much in the news, you might be forgiven for overlooking one of the other primary functions of an Internet Service Provider or ISP: Regulating the speed of the network connections that they make available to their subscribers. While you may have been cursing your ISP for their grindingly slow connections and the … Read More

The Growing Use of Blockchain Technology in Cars

Finjan TeamBlog, Cybersecurity

Finjan The Growing Use of Blockchain Technology in Cars

With the evolution of the automobile beyond four (sometimes three) wheels, a solid chassis, and an internal combustion engine, vehicular technology has had to embrace a full spectrum of innovations, as the market continues to develop and grow. New materials, alternative fuel, and energy sources, changing manufacturing and safety standards, and the incorporation of computer technology throughout: All of these … Read More

Employee Compliance and the Challenge to a Cybersecurity Strategy

Finjan TeamBlog, Cybersecurity

Finjan Employee Compliance and the Challenge to a Cybersecurity Strategy

Around 39% of respondents to a recent business survey conducted by Tech Pro Research said that their company has a formal, regularly updated policy for cybersecurity, typically covering employee training and automatic software updates, and often with the inclusion of new firewall or anti-virus products. Unfortunately, an equal number of those polled (39%) said that their companies didn’t have a … Read More

Data Privacy in Europe, the US, and Other Regions

Finjan TeamBlog, Cybersecurity

Finjan Data Privacy in Europe, the US, and Other Regions

As each day’s news seems to bring fresh revelations on how internet giants like Facebook and Google are allegedly abusing the trust of their subscribers by harvesting and selling personal data to the highest bidder, issues concerning online and general information privacy have become a major talking point. These issues have also become a priority for lawmakers across the planet, … Read More

Healthcare Data Breaches – A Common Problem and a Real Threat

Finjan TeamBlog, Cybersecurity

Finjan Healthcare Data Breaches   A Common Problem and a Real Threat

As a safeguard for patients’ personal or financial data, to protect the integrity of pharmaceutical products and medical processes, and for various other reasons, organizations operating in the healthcare sector are required to comply with conditions set out by legal frameworks such as the Health Insurance Portability and Accountability Act (HIPAA). These provide recommendations and regulatory compliance demands which are … Read More

How GPUs Are Used In Cryptocurrency Mining

Finjan TeamBlog, Cybersecurity

Finjan How GPUs Are Used In Cryptocurrency Mining

The increasing market activity and sometimes astronomical rise in the value of cryptocurrencies like Bitcoin, Ethereum, Litecoin, and Ripple in recent months has done more than create profit-making opportunities for eager investors. There’s been a knock-on effect on the computer market, as more people realize the potential to make money through creating these digital assets by generating them through the … Read More

Cyber Threats – How the Public is at Risk from Cyberattack

Finjan TeamBlog, Cybersecurity

Finjan Cyber Threats   How the Public is at Risk from Cyberattack

Given the number of media reports on high-profile cyber-attacks involving well-known brand names, organizations, or celebrities, you might be forgiven for assuming that only huge corporations or the rich and famous are targeted for cyber-crime attacks. But this is a dangerous assumption to make – one that can lead “ordinary” citizens to become dismissive or complacent, when it comes to … Read More