IoT Security Flaws

Finjan TeamBlog, Cybersecurity

Finjan IoT Security Flaws

With current estimates suggesting that the global network of online and inter-connected smart hardware and applications known as the IoT or Internet of Things will expand to over 20 billion devices by 2020, the market for self-monitoring cars, household appliances that check in regularly with your local supermarket, and numerous other such gadgets, looks set to grow at a steady … Read More

Flaws in the GMR-2 Cipher Used in Cellular Service

Finjan TeamBlog, Cybersecurity

Finjan Flaws in the GMR 2 Cipher Used in Cellular Service

In areas where conventional network coverage isn’t available, cellular service is routinely parceled out via satellite telephone systems, which provide encryption security for their data transmission through what’s known as the GMR-2 cipher. Such services may be the only option for users in remote or isolated environments, like ocean-going vessels or high-altitude locations – and they’re also a critical choice … Read More

How to Prevent a SQL Injection

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent a SQL Injection

If you’re a fan of contemporary thriller movies or television, you’ll no doubt have watched a scene where some enterprising (usually young, and quirky) “hacker” sits in front of a keyboard, flexes their fingers, and spouts knowledgeably about the various methods he/she will use to break into the Pentagon/bank security system, or whatever. The words, “SQL injection” may likely come … Read More

The Dangers of MaaS (Malware as a Service)

Finjan TeamBlog, Cybersecurity

Finjan The Dangers of MaaS (Malware as a Service)

Information Technology has become a commodity in its own right. Virtually all aspects of IT are now available as some variant of the “XaaS” family, which includes Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and numerous others. They all save time, effort, and money for individuals or enterprise subscribers. And the advantages … Read More

The Evolving Role of Artificial Intelligence in Cybersecurity

Finjan TeamBlog, Cybersecurity

Finjan The Evolving Role of Artificial Intelligence in Cybersecurity

It’s often been observed that technological advancement is a double-edged sword – and this is especially true in the realm of cybersecurity. Attackers have been known to use automation technology to stage and sustain their strikes – while those same machine learning algorithms and real-time response mechanisms can help enterprises that suffer an assault to speed up their efforts at … Read More

7 Tell-Tale Warning Signs That You Have Been Hacked

Finjan TeamBlog, Cybersecurity

Finjan 7 Tell Tale Warning Signs That You Have Been Hacked

We hear a lot in the media and around the web about the evils of cyber-crime, and the inevitability of being hacked. But aside from the obvious – like the grandstanding perpetrator of ransomware who greets you on start-up with a grinning skull, and exorbitant demands for BitCoin – how can you tell if you’ve recently (or not so recently) … Read More

Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More

How to Prevent Phishing Attacks – 9 Helpful Tips to Avoid Caught

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent Phishing Attacks   9 Helpful Tips to Avoid Caught

In this article, we will look at examples and advice on how to prevent phishing attacks. In digital terms, the practice of phishing – using threatening or enticing messages to compel a recipient to rashly give out personal or financial data, or to blindly rush to a booby-trapped website – is almost as old as the riverbank activity that its … Read More

Network Security Objectives and Attack Modes

Finjan TeamBlog, Network Security

Finjan Network Security Objectives and Attack Modes

A network exists when two or more computing systems are linked in a mutually dependent relationship that enables them to share resources and/or information. The connection between systems may be a physical one – as is the case with a traditional private data center, where banks of servers and systems are connected by cables, routers, and switches. It may also … Read More

Egress Monitoring

Finjan TeamBlog, Cybersecurity

Finjan Egress Monitoring

With so many threats looming from intruders and malicious software originating outside of systems and corporate LANs, it’s easy to overlook the fact that security lapses and vulnerabilities can equally emanate from within a connected system or private network, and make their way out to cause damage as well. So for comprehensive security coverage, it’s essential not only to have … Read More