Car Companies and Big Data – How Smart Cars Collect Your Data

Finjan TeamBlog, Cybersecurity

Finjan Car Companies and Big Data   How Smart Cars Collect Your Data

Gone are the days when vehicular transport simply meant four wheels, an internal combustion engine, two or more doors, and a solid roof (if you were lucky). Cars, trucks, and buses of the digital age typically carry around 40 microprocessors and dozens of electronic sensors to regulate their functions and monitor performance. And like other mechanisms and appliances which incorporate … Read More

Spectre and Meltdown

Finjan TeamBlog, Cybersecurity

Finjan Spectre and Meltdown

2018 has just begun – and already we’ve seen the year’s first major cyber-security crisis. It concerns two vulnerabilities with the capacity to affect the majority of computers, smartphones, laptops, and tablets developed since 2011 – and it’s got individual citizens and businesses (including some of the world’s most heavyweight commercial organizations) scrambling to make sense of the issues, and … Read More

Benefits of Companies Taking Out Cybersecurity Insurance

Finjan TeamBlog, Cybersecurity

Finjan Benefits of Companies Taking Out Cybersecurity Insurance

Security and business IT professionals are pretty much in agreement that it’s impossible for commercial organizations to completely avoid being hit by some form of cyber-attack or security breach – either as a future event or an incident that’s already occurred. While planning, policy-making, and the deployment of security mechanisms, devices, and protocols may offer some relief, the inevitability of … Read More

What is a Zero Trust Network?

Finjan TeamBlog, Cybersecurity

Finjan What is a Zero Trust Network?

The traditional model of network security relies on the establishment of a secure boundary, or perimeter. This not only keeps unwanted “visitors” or attackers out but also assumes that those who remain within the boundary are only authorized users of the system. These authorized users may then be trusted only to access the network resources that have been allocated to … Read More

The Importance of Digital Forensics

Finjan TeamBlog, Cybersecurity

Finjan The Importance of Digital Forensics

Just as in the physical world, we leave traces of ourselves – fingerprints, hairs, clothing fibers, DNA, etc. – when we move and interact with people, places, and objects, so too do activities in the digital realm leave pieces or echoes of themselves. These virtual or digital traces – think file fragments, activity logs, timestamps, metadata, and so on – … Read More

The Loapi Mining Trojan

Finjan TeamBlog, Cybersecurity

Finjan The Loapi Mining Trojan

Though its reputation has taken a battering in recent months over allegations of involvement in long-term spying or extreme surveillance operations conducted against agencies of the U.S. government, the Russia-based security firm Kaspersky Lab has recently made the news for more positive reasons. Researchers at Kaspersky have discovered a Trojan named Loapi – a resourceful and potentially deadly piece of … Read More

Advantages of Cryptocurrency

Finjan TeamBlog, Cybersecurity

Finjan Advantages of Cryptocurrency

Having emerged as a digital alternative to more traditional methods of exchange like cash or credit cards, cryptographic or cryptocurrencies have also generated alternative points of view. On the one hand, there’s the school of thought which sees cryptocurrencies as a financial medium for fraudsters, terrorists, and criminals – especially given their involvement in ransomware scams, and in trading on … Read More

What Does Net Neutrality Mean for Your Privacy?

Finjan TeamBlog, Cybersecurity

Finjan What Does Net Neutrality Mean for Your Privacy?

In its purest form, net neutrality is the principle that all data on the internet should be treated equally by Internet Service Providers (ISPs), government bodies regulating internet access, and all entities concerned with the movement and management of data over the internet, generally. This idea considers internet access provision to be a public utility, much like water or electricity … Read More

Home DNA Tests Could Be Gathering Your Personal Info! A Discussion of Genetic Testing Privacy Issues

Finjan TeamBlog, Cybersecurity

Finjan Home DNA Tests Could Be Gathering Your Personal Info!  A Discussion of Genetic Testing Privacy Issues

Privacy concerns and worries about the handling of information gathered from consumers by mobile apps, websites, and online resources have been very much in the news, of late. But with the holiday season upon us – and with many people having excess time on their hands and/or memorable festive gifts to shop for – there’s an unusual new avenue which … Read More

Hardware Encryption – How is the Market Emerging?

Finjan TeamBlog, Cybersecurity

Finjan Hardware Encryption – How is the Market Emerging?

Privacy and information security concerns have fueled the increased usage in recent years of data encryption. Much of the focus of this activity – and most of the forms in which the related technology has been distributed and implemented – has been on desktop software, mobile applications, and network/system processes. But hardware-based encryption methods and technologies do exist – and … Read More