A Survivor’s Guide to Ransomware

Finjan TeamBlog, Cybersecurity

Finjan A Survivors Guide to Ransomware

Each week seems to bring fresh tales of horror from the cyber-security landscape. Email hacks, data breaches, compromised social media platforms – and good old-fashioned malware.  The trending threat of the moment is coming from a new breed of malicious software, known as ransomware. In this guide, we’ll explain what it’s about, and how to protect yourself from it. What … Read More

Browser Security – Tips, Guidelines and Best Practices

Finjan TeamBlog, Cybersecurity

Finjan Browser Security   Tips, Guidelines and Best Practices

For many of us, our first point of contact with the outside world of the internet is a web browser application – a fact that’s known all too well by many an enterprising cyber-criminal. For years, hackers and cyber attackers have been looking for (and finding) weaknesses to exploit in the underlying code, active tool-sets, and associated tools of leading … Read More

Blacklisting vs Whitelisting – Understanding the Security Benefits of Each

Finjan TeamBlog, Cybersecurity

Finjan Blacklisting vs Whitelisting   Understanding the Security Benefits of Each

Guarding individual computer systems and organizational networks from the effects of malicious software or the intrusion of unauthorized users and applications begins with solid perimeter and endpoint defenses, and an effective method of access control. Though opinions differ as to which is best, two approaches dominate in the bid to restrict and regulate access to vital system and network resources … Read More

Digital Signatures and Information Security

Finjan TeamBlog, Cybersecurity

Finjan Digital Signatures and Information Security

As online and electronic transactions gain as much or more validity than traditional paper-based ones, there’s an increasing need to ensure the authenticity and integrity of the various parties involved, the data and assets traded between them, and the overall security of the transaction process. One method used to accomplish this is the use of digital signatures. What Are Digital … Read More

How to Prevent Phishing Attacks – 9 Helpful Tips to Avoid Caught

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent Phishing Attacks   9 Helpful Tips to Avoid Caught

In this article, we will look at examples and advice on how to prevent phishing attacks. In digital terms, the practice of phishing – using threatening or enticing messages to compel a recipient to rashly give out personal or financial data, or to blindly rush to a booby-trapped website – is almost as old as the riverbank activity that its … Read More

IoT and Terrorism – Is Innovation Outpacing Security Awareness?

Finjan TeamBlog, Cybersecurity

Finjan IoT and Terrorism   Is Innovation Outpacing Security Awareness?

The operational and commercial opportunities offered by the Internet of Things (IoT) is resulting in the proliferation of consumer, government, and institutional devices which are internet-enabled, often inter-connected, and independently “intelligent”, to the extent that they may be observant, communicative, self-monitoring, and self-regulating. IoT and Terrorism – some interesting facts: Current estimates point to the active deployment of over six … Read More

Common Sneak Attacks Used By Sophisticated Hackers

Finjan TeamBlog, Cybersecurity

Finjan Common Sneak Attacks Used By Sophisticated Hackers

Even though malicious actors continue to score successes by using time-honored cyber-attack techniques preying on the greed, ignorance, poor judgment, or lack of virtual “street smarts” of unsuspecting users, recent years have seen an evolution in hacker methodology. Sophisticated technologies and frankly ingenious uses of simple ideas are empowering a new breed of hacker, and new strains of malware. In … Read More

Top 5 Emerging Security Technologies

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Emerging Security Technologies

Like computing itself, the information security or InfoSec landscape is continuously evolving. What was once the cyber-threat or threat remedy of the month can give way to alternatives, as new techniques and technologies are pioneered by cyber-criminals or InfoSec professionals, alike. As 2017 moves into its second quarter, we’ll be looking at five of the emerging security technologies that are … Read More

9 Common Hacking Techniques and How to Deal With Them

Finjan TeamBlog, Cybersecurity

Finjan 9 Common Hacking Techniques and How to Deal With Them

With high-value targets like user credentials, email accounts, and credit card details being stored on personal devices and transmitted freely over the internet, attempts to gain access to these prizes continue at an astonishing pace. Hacking – looking to gain unauthorized access to information by modifying the features of a system or network, or exploiting its vulnerabilities – is one … Read More

Encapsulating Security Protocol (ESP)

Finjan TeamBlog, data security

Finjan Encapsulating Security Protocol (ESP)

Messages, documents, and files sent via the internet are transmitted in the form of data packets using one or more transfer mechanisms or protocols such as TCP/IP. But how can we ensure that the information received is the authentic material which the originator of the message claims to have sent? That its confidentiality has been preserved along the way? And … Read More