The Power of the Botnet

Finjan TeamBlog, Cybersecurity

Finjan The Power of the Botnet

With the advances in digital technology and the quantum leap in connection speeds of recent years, we’ve become accustomed to logging into our accounts or visiting our favorite haunts on the web, with minimal fuss or incident. And if there’s a delay or hiccup in reaching these services, we’re more inclined to blame the software or the service provider, rather … Read More

The Dangers of MaaS (Malware as a Service)

Finjan TeamBlog, Cybersecurity

Finjan The Dangers of MaaS (Malware as a Service)

Information Technology has become a commodity in its own right. Virtually all aspects of IT are now available as some variant of the “XaaS” family, which includes Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and numerous others. They all save time, effort, and money for individuals or enterprise subscribers. And the advantages … Read More

Common Sneak Attacks Used By Sophisticated Hackers

Finjan TeamBlog, Cybersecurity

Finjan Common Sneak Attacks Used By Sophisticated Hackers

Even though malicious actors continue to score successes by using time-honored cyber-attack techniques preying on the greed, ignorance, poor judgment, or lack of virtual “street smarts” of unsuspecting users, recent years have seen an evolution in hacker methodology. Sophisticated technologies and frankly ingenious uses of simple ideas are empowering a new breed of hacker, and new strains of malware. In … Read More

9 Common Hacking Techniques and How to Deal With Them

Finjan TeamBlog, Cybersecurity

Finjan 9 Common Hacking Techniques and How to Deal With Them

With high-value targets like user credentials, email accounts, and credit card details being stored on personal devices and transmitted freely over the internet, attempts to gain access to these prizes continue at an astonishing pace. Hacking – looking to gain unauthorized access to information by modifying the features of a system or network, or exploiting its vulnerabilities – is one … Read More

Malvertising and How it’s Being Used to Launch Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Malvertising and How its Being Used to Launch Cyber Attacks

Trust and ignorance can work hand in hand to produce favorable results – from a cybercriminal’s point of view. That’s why perpetrators are turning to a disturbing new strategy for porting malware on to unsuspecting users: Visitors to reputable, high-profile websites and portals are becoming infected by malicious code that’s distributed by “malvertising“. What is Malvertising? Malvertising (a contraction for … Read More

Behavior Based Anti-virus Technology

Finjan TeamBlog, Cybersecurity

Finjan Behavior Based Anti virus Technology

The evolving power and complexity in malware of all kinds demands an equivalent response from security suites and anti-virus software. The methods of detection and prevention that were traditionally used are no longer enough. New techniques and new technologies are required to cope with today’s landscape of existing and emerging cyber-threats. In this article, we’ll be looking at Behavior Based … Read More

Zero-day Threats

Finjan TeamBlog, Cybersecurity

Finjan Zero day Threats

Sadly, taking steps to avoid becoming the victim of a cyber-attack and putting measures in place to respond to one in the event that it occurs isn’t the entire story in preparing a strategy for cyber-security. There’s a major class of vulnerability that’s capable of causing serious damage, but for which specific preparations can’t be made – zero-day threats. What … Read More

FighterPOS – malware designed to infiltrate point of service payment systems

Finjan TeamBlog, Cybersecurity

Finjan FighterPOS   malware designed to infiltrate point of service payment systems

Security Affairs’ Pierluigi Paganini reported yesterday that FighterPOS, an advanced form of malware designed to infiltrate point of service payment systems, has made the jump from its native Brazil to the United States. Security Researchers at TrendMicro have isolated new strings of code in known versions of the malware that have been written in English, instead of the original Portuguese … Read More