Accessing Your Crypto Wallet Through Android Devices?

Accessing Your Crypto Wallet Through Android Devices?

Android platforms are commonly characterized by the presence of Trojan-infected apps that have built-in cryptocurrency mining codes, which means that mobile users are highly susceptible to malicious cryptocurrency mining attacks. It is quite alarming to note that cyber criminals deploy malicious APKs that are delivered through SMS spam and cryptocurrency ... Read More
The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year. In this article, I will continue digging deeper and discuss its patterns of invasions. As people keep talking about how cybercriminals used the banking Trojan Trickbot ... Read More
Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

Malicious Cryptocurrency Mining: The “Shooting Star” in the Cybercrime Domain

It’s quite evident how these days, attacks assume new forms along with transformations in the types of services that are widely used by consumers in a given period of time. Needless to mention, malware or malicious activities will find their presence in new applications and services as they evolve to ... Read More
Detecting Malware/APT Through Automatic Log Analysis

Detecting Malware/APT Through Automatic Log Analysis

Legacy perimeter security mechanisms can be evaded very easily. It’s disappointing, but it’s true. Innovatively-designed malware and APTs have the potential to evade even the strongest signature-based security solutions that are currently being deployed across industries. This has encouraged IT companies to think beyond prevention and to design effective detection ... Read More
GDPR in Action, Even Facebook Impacted

GDPR in Action, Even Facebook Impacted

As Europe awaits the General Data Protection Regulation (GDPR) to come into force on May 25th, Facebook is enforcing new terms of service to its users to ensure compliance with the upcoming data privacy law. It will regulate how Facebook collects and uses user data that is critical to the ... Read More
High-Performance Visibility into SSL/TLS Traffic

High-Performance Visibility into SSL/TLS Traffic

Protection of your business’s confidential information and prevention of data breaches are crucial to supporting successful business operations. This necessarily involves taking that extra step to safeguard all forms of communication, including streaming videos, social media interactions, and email messages, against security threats. With SSL/TLS, you can establish secure communication ... Read More
Maintaining Your Data Center’s Agility and Making the Most Out of Your Investment in ADC Capacity

Maintaining Your Data Center’s Agility and Making the Most Out of Your Investment in ADC Capacity

Deciding on an appropriate application delivery controller (ADC) and evaluating the need for supporting infrastructure is a complex, complicated, and challenging job. Such challenges result from the fact that ADCs are increasingly used across diverse environments and virtual, cloud, and physical appliances. Insufficient ADC capability that is commonly associated with ... Read More
5G Security Challenges and Ways to Overcome Them

5G Security Challenges and Ways to Overcome Them

| | 5G, iot, NFV, sdn, security
As the world waits for the introduction of 5G networks, the industry gears up to address the security challenges that may accompany 5G. The 5G networks would essentially promote the use of a huge number of interconnected devices, a tremendous increase in bandwidth, and collaborative functioning of legacy and new ... Read More
An Overview of the TCP Optimization Process

An Overview of the TCP Optimization Process

The Transmission Control Protocol (TCP) drives major internet operations such as video streaming, file transfers, web browsing, and communications, accounting for very high percentages of fixed access internet traffic and even more of mobile internet traffic. Surprisingly, the TCP performance is yet to reach its full potential. Sub-optimal TCP performance ... Read More
SIP Protection: What Your SIP Security Solution Should Have

SIP Protection: What Your SIP Security Solution Should Have

SIP-enabled devices have gained widespread use in recent times. With more and more VoIP applications that use SIP as their signalling protocol being developed these days, the industry should put greater emphasis on safeguarding SIP assets against undesirable exploitations that may either degrade the quality of VoIP services or promote ... Read More