How Dangerous Are Potentially Unwanted Applications or PUA’s?

Finjan TeamBlog, Cybersecurity

Finjan How Dangerous Are Potentially Unwanted Applications or PUA’s?

Corporate employees or private users whose systems or devices come with pre-installed software usually aren’t concerned with knowing exactly what programs they have, as long as they can do their jobs or use their hardware without any complications. But if your system contains or installs pre-packaged or bundled software, it may be at risk from Potentially Unwanted Applications. What Are … Read More

Big Tech – A Look at How Big Firms, Employers and Governments Violate Privacy

Finjan TeamBlog, Cybersecurity

Finjan Big Tech   A Look at How Big Firms, Employers and Governments Violate Privacy

Big tech companies, major employers, and government agencies all have a vested interest in monitoring activities and collecting data – but the privacy of the people concerned in these information gathering exercises may often be disregarded, or abused. Players in the “big tech” arena have had a checkered history with regard to data privacy matters. But recent changes in European … Read More

Cybersecurity Compliance Frameworks

Finjan TeamBlog, Cybersecurity

Finjan Cybersecurity Compliance Frameworks

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche … Read More

Social Engineering Attacks – How to Avoid Becoming a Victim

Finjan TeamBlog, Cybersecurity

Finjan Social Engineering Attacks   How to Avoid Becoming a Victim

Cyber-attacks have increased in sophistication – not only in the technology and resources available to hackers but also with the evolution of techniques like social engineering. Just as a galvanized steel chain is only as strong as its weakest link, the security of your business is only as good as its most vulnerable elements. And for the majority of businesses, … Read More

Web Cache Poisoning – How Hackers Are Weaponizing Web Caches

Finjan TeamBlog, Cybersecurity

Finjan Web Cache Poisoning   How Hackers Are Weaponizing Web Caches

In a recently discovered (but yet to be fully publicized) attack, security researcher James Kettle has apparently succeeded in cache poisoning, the hacking and weaponizing of the web caches of several major websites and online platforms. The victims include online stores, a software product, a video game, a popular cloud platform provider, a hosting platform provider, an investment company’s investor … Read More

Leaked Credentials – An Insidious Problem for the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Leaked Credentials   An Insidious Problem for the Enterprise

Though data breaches have the potential to expose corporate secrets, finances, and intellectual property to prying eyes, a more insidious problem for the enterprise is the issue of leaked credentials. Email and network usernames, passwords, and related information may also form a major part of the corporate data leakage that follows a serious breach. And since these identifiers may be … Read More

Employee Security Awareness Training – Management Side

Finjan TeamBlog, Cybersecurity

Finjan Employee Security Awareness Training – Management Side

As many organizations have learned to their regret, a policy for cybersecurity – however comprehensive, proactive, and technologically sound it may be – is doomed to failure if its terms aren’t adhered to by stakeholders of the enterprise, across the board. This emphasizes the need both for eliciting buy-in to the concept and culture of security awareness, and for management … Read More

The Benefits of Real-Time Cyber Threat Intelligence

Finjan TeamBlog, Cybersecurity

Finjan The Benefits of Real Time Cyber Threat Intelligence

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air, or identified and adopted without knowledge of what they are, how they should be used, and … Read More

How will GDPR Affect Social Media Marketing?

Finjan TeamBlog, Cybersecurity

Finjan How will GDPR Affect Social Media Marketing?

The May 25th, 2018 deadline for its formal introduction has passed and organizations across the globe are scrambling frantically to ensure that they’re prepared to meet the demanding terms of the European Union’s (EU’s) General Data Protection Regulation or GDPR. It’s a legal and compliance framework designed to safeguard the privacy and data rights of EU citizens and residents – … Read More

Browser Extension Sniffers – How Do Bad Actors Use Them?

Finjan TeamBlog, Cybersecurity

Finjan Browser Extension Sniffers   How Do Bad Actors Use Them?

Web browser extensions are those little applets you can add to your Firefox, Chrome, Edge/Internet Explorer or other desktop, to increase the functionality of the main program, and spice up your online experience in any number of ways. For the desktop browser environment, extensions are pretty much the equivalent to mobile apps. In fact, many of them also come in … Read More