The Benefits of Real-Time Cyber Threat Intelligence

Finjan TeamBlog, Cybersecurity

Finjan The Benefits of Real Time Cyber Threat Intelligence

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air, or identified and adopted without knowledge of what they are, how they should be used, and … Read More

Best Practices to Prevent DLL Hijacking

Finjan TeamBlog, Cybersecurity

Finjan Best Practices to Prevent DLL Hijacking

Though we routinely use computer programs to perform our daily tasks, few of us actually know or tend to consider the implications of how this software is constructed, and any weaknesses it might be vulnerable to before it starts its work. But hackers and the malicious tools employed by cyber-criminals don’t only target applications once they’re up and running. It’s … Read More

How Honeytokens Are Used To Track Cybercriminals

Finjan TeamBlog, Cybersecurity

Finjan How Honeytokens Are Used To Track Cybercriminals

Proactive methods of cyber-defense, including the use of “honeytokens”, have been growing in popularity recently, as commercial and other organizations seek ways of “bringing the fight” to hackers and cyber-criminals, rather than just sitting back and waiting for something to happen. Ironically, one of those ways involves just that: Sitting back and waiting for something to happen – but only … Read More

Cyber Threats – How the Public is at Risk from Cyberattack

Finjan TeamBlog, Cybersecurity

Finjan Cyber Threats   How the Public is at Risk from Cyberattack

Given the number of media reports on high-profile cyber-attacks involving well-known brand names, organizations, or celebrities, you might be forgiven for assuming that only huge corporations or the rich and famous are targeted for cyber-crime attacks. But this is a dangerous assumption to make – one that can lead “ordinary” citizens to become dismissive or complacent, when it comes to … Read More

Top 5 Cybersecurity Mistakes That Make Life Easy for Cyber-criminals

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Cybersecurity Mistakes That Make Life Easy for Cyber criminals

Though high-profile assaults on huge corporations or well-known web platforms grab the most attention when they make the news, cyber-criminals are at work at all levels – from attacks on private individuals, to attempts made on businesses and organizations of all types and sizes. In recent times, they’ve met with increasing success, resulting in huge personal and corporate losses in … Read More

Spectre and Meltdown

Finjan TeamBlog, Cybersecurity

Finjan Spectre and Meltdown

2018 has just begun – and already we’ve seen the year’s first major cyber-security crisis. It concerns two vulnerabilities with the capacity to affect the majority of computers, smartphones, laptops, and tablets developed since 2011 – and it’s got individual citizens and businesses (including some of the world’s most heavyweight commercial organizations) scrambling to make sense of the issues, and … Read More

Email Spoofing – How SPF, DMARC and DKIM Help Detect and Prevent Attacks

Finjan TeamBlog, Cybersecurity

Finjan Email Spoofing   How SPF, DMARC and DKIM Help Detect and Prevent Attacks

As email remains one of the primary communications channels for private individuals, commercial or non-commercial organizations, and government institutions, it’s little wonder that it also continues to be a medium of choice for hackers and cyber-criminals. Two of their preferred attack methods are impersonation and fraud – both of which may be readily accomplished by spoofing the internet domains associated … Read More

How to Avoid a Slack Attack

Finjan TeamBlog, Cybersecurity

Finjan How to Avoid a Slack Attack

Email is still the primary medium of communication between individuals, businesses, and organizations – so it’s hardly surprising that cyber-criminals look to email as their major channel for conducting phishing and social media scams, or distributing malicious software such as ransomware. It’s been estimated that the world will have to foot the bill for $6 trillion annually, by 2021 – … Read More

The Power of the Botnet

Finjan TeamBlog, Cybersecurity

Finjan The Power of the Botnet

With the advances in digital technology and the quantum leap in connection speeds of recent years, we’ve become accustomed to logging into our accounts or visiting our favorite haunts on the web, with minimal fuss or incident. And if there’s a delay or hiccup in reaching these services, we’re more inclined to blame the software or the service provider, rather … Read More

IoT Security Flaws

Finjan TeamBlog, Cybersecurity

Finjan IoT Security Flaws

With current estimates suggesting that the global network of online and inter-connected smart hardware and applications known as the IoT or Internet of Things will expand to over 20 billion devices by 2020, the market for self-monitoring cars, household appliances that check in regularly with your local supermarket, and numerous other such gadgets, looks set to grow at a steady … Read More