CPU Vulnerabilities – How Flaws Can Lead to Exploits

Finjan TeamBlog, Cybersecurity

Finjan CPU Vulnerabilities   How Flaws Can Lead to Exploits

As we’ll see in a moment, design flaws and other weaknesses in the central processing unit or CPU of a computer or mobile device can create and have in fact produced a number of vulnerabilities that are causing concern to hardware manufacturers and users the world over. They have reason to worry because, in the assessment of Google, “effectively every” … Read More

How Two Factor Authentication, or 2FA, Can Help Thwart Phishing Attacks

Finjan TeamBlog, Cybersecurity

Finjan How Two Factor Authentication, or 2FA, Can Help Thwart Phishing Attacks

Two Factor Authentication or 2FA, is now widely accepted as the required minimum for increasing the safety of users against the threat of phishing attacks. For some years now, hackers, cyber-criminals, and identity thieves have used phishing tactics to lure unsuspecting victims into downloading booby-trapped file attachments, visiting bogus websites, and divulging sensitive information. Account profiles and credentials such as … Read More

Microsoft Implementing JavaScript In Excel: What Are The Potential Threats?

Finjan TeamBlog, Cybersecurity

Finjan Microsoft Implementing JavaScript In Excel: What Are The Potential Threats?

Since its arrival on the computing scene in 1995, JavaScript has emerged as a “consumer level” programming language capable of powering common website features like multimedia modules and form submissions. And given its long history, JavaScript code snippets are currently available across the internet, in a number of freely accessible libraries and resource bases. It provides convenient automation – for … Read More

Best Practices to Prevent DLL Hijacking

Finjan TeamBlog, Cybersecurity

Finjan Best Practices to Prevent DLL Hijacking

Though we routinely use computer programs to perform our daily tasks, few of us actually know or tend to consider the implications of how this software is constructed, and any weaknesses it might be vulnerable to before it starts its work. But hackers and the malicious tools employed by cyber-criminals don’t only target applications once they’re up and running. It’s … Read More

Browser Extension Sniffers – How Do Bad Actors Use Them?

Finjan TeamBlog, Cybersecurity

Finjan Browser Extension Sniffers   How Do Bad Actors Use Them?

Web browser extensions are those little applets you can add to your Firefox, Chrome, Edge/Internet Explorer or other desktop, to increase the functionality of the main program, and spice up your online experience in any number of ways. For the desktop browser environment, extensions are pretty much the equivalent to mobile apps. In fact, many of them also come in … Read More

The Power of the Botnet

Finjan TeamBlog, Cybersecurity

Finjan The Power of the Botnet

With the advances in digital technology and the quantum leap in connection speeds of recent years, we’ve become accustomed to logging into our accounts or visiting our favorite haunts on the web, with minimal fuss or incident. And if there’s a delay or hiccup in reaching these services, we’re more inclined to blame the software or the service provider, rather … Read More

Russian Hacking and The Kaspersky Link

Finjan TeamBlog, Cybersecurity

Finjan Russian Hacking and The Kaspersky Link

In this age of ransomware, phishing, fake news, social engineering, and the million-record data breach, commercial enterprises and government institutions are more than ever advised to install an up to date and powerful suite of security and antivirus software. But what happens when the integrity of the very applications that are supposed to protect our institutions, is itself called into … Read More

How to Prevent a SQL Injection

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent a SQL Injection

If you’re a fan of contemporary thriller movies or television, you’ll no doubt have watched a scene where some enterprising (usually young, and quirky) “hacker” sits in front of a keyboard, flexes their fingers, and spouts knowledgeably about the various methods he/she will use to break into the Pentagon/bank security system, or whatever. The words, “SQL injection” may likely come … Read More

The Dangers of MaaS (Malware as a Service)

Finjan TeamBlog, Cybersecurity

Finjan The Dangers of MaaS (Malware as a Service)

Information Technology has become a commodity in its own right. Virtually all aspects of IT are now available as some variant of the “XaaS” family, which includes Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and numerous others. They all save time, effort, and money for individuals or enterprise subscribers. And the advantages … Read More

7 Tell-Tale Warning Signs That You Have Been Hacked

Finjan TeamBlog, Cybersecurity

Finjan 7 Tell Tale Warning Signs That You Have Been Hacked

We hear a lot in the media and around the web about the evils of cyber-crime, and the inevitability of being hacked. But aside from the obvious – like the grandstanding perpetrator of ransomware who greets you on start-up with a grinning skull, and exorbitant demands for BitCoin – how can you tell if you’ve recently (or not so recently) … Read More