How to Prevent Phishing Attacks – 9 Helpful Tips to Avoid Caught

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent Phishing Attacks   9 Helpful Tips to Avoid Caught

In this article, we will look at examples and advice on how to prevent phishing attacks. In digital terms, the practice of phishing – using threatening or enticing messages to compel a recipient to rashly give out personal or financial data, or to blindly rush to a booby-trapped website – is almost as old as the riverbank activity that its … Read More

IoT and Terrorism – Is Innovation Outpacing Security Awareness?

Finjan TeamBlog, Cybersecurity

Finjan IoT and Terrorism   Is Innovation Outpacing Security Awareness?

The operational and commercial opportunities offered by the Internet of Things (IoT) is resulting in the proliferation of consumer, government, and institutional devices which are internet-enabled, often inter-connected, and independently “intelligent”, to the extent that they may be observant, communicative, self-monitoring, and self-regulating. IoT and Terrorism – some interesting facts: Current estimates point to the active deployment of over six … Read More

Common Sneak Attacks Used By Sophisticated Hackers

Finjan TeamBlog, Cybersecurity

Finjan Common Sneak Attacks Used By Sophisticated Hackers

Even though malicious actors continue to score successes by using time-honored cyber-attack techniques preying on the greed, ignorance, poor judgment, or lack of virtual “street smarts” of unsuspecting users, recent years have seen an evolution in hacker methodology. Sophisticated technologies and frankly ingenious uses of simple ideas are empowering a new breed of hacker, and new strains of malware. In … Read More

Top 5 Emerging Security Technologies

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Emerging Security Technologies

Like computing itself, the information security or InfoSec landscape is continuously evolving. What was once the cyber-threat or threat remedy of the month can give way to alternatives, as new techniques and technologies are pioneered by cyber-criminals or InfoSec professionals, alike. As 2017 moves into its second quarter, we’ll be looking at five of the emerging security technologies that are … Read More

9 Common Hacking Techniques and How to Deal With Them

Finjan TeamBlog, Cybersecurity

Finjan 9 Common Hacking Techniques and How to Deal With Them

With high-value targets like user credentials, email accounts, and credit card details being stored on personal devices and transmitted freely over the internet, attempts to gain access to these prizes continue at an astonishing pace. Hacking – looking to gain unauthorized access to information by modifying the features of a system or network, or exploiting its vulnerabilities – is one … Read More

The Rijndael Encryption Algorithm

Finjan TeamBlog, Cybersecurity

Finjan The Rijndael Encryption Algorithm

As the Data Encryption Standard (DES) began to show signs of weakness after several years of use, and in the wake of a security crisis surrounding its Triple DES (3DES) variant, the U.S. National Institute of Standards and Technology (NIST) threw a challenge to cryptographers to develop a more resilient platform for the encryption of mission-critical data. What emerged above … Read More

The Non-Interference Model

Finjan TeamBlog, Cybersecurity

Finjan The Non Interference Model

Security models of control are used as a way of formalizing a security policy. They determine in one way or another how security will be implemented across a system or network, which subjects are permitted access to the system, and which objects they are allowed access to. These security models are typically put in place by enforcing confidentiality, integrity, or … Read More

Trusted Computing Base or “TCB”

Finjan TeamBlog, Cybersecurity

Finjan Trusted Computing Base or TCB

As well as an infrastructure of components and processes, a computer system also requires a security architecture defining its capacity to resist attacks and attempts at infiltration and providing its capability to detect and respond to threats and changing conditions. With susceptibility to attack being as critical a factor to system stability as the potential failure of its component parts, … Read More

Common Criteria for Information Technology Security Evaluation

Finjan TeamBlog, Cybersecurity

Finjan Common Criteria for Information Technology Security Evaluation

The need to ensure that consumers have access to IT products which are inherently secure has raised a demand for some kind of internationally recognized standard for evaluating and certifying equipment and software. Such a standard exists in what’s collectively known as the Common Criteria or CC. Common Criteria or CC More formally known as the “Common Criteria for Information … Read More

Biba Integrity Model

Finjan TeamBlog, Cybersecurity

Finjan Biba Integrity Model

Confidentiality, integrity, and availability make up the “security triad” as it applies to data. And one of the principal security models dedicated to preserving the integrity of information is the Biba integrity model, which we’ll be looking at today. Biba Integrity Model – Some History For years, matters of data confidentiality were largely dealt with by the Bell-LaPadula model, which … Read More