Overview of the various rules and techniques used by BlackFog for cybersecurity protection.
When using AVAST Anti-virus software you may receive a Threat Detection warning from BlackFog Privacy which may prevent some features of AVAST from working correctly.
The Dark Web Network Blocking option is an important security measure to prevent data loss, activation and transfer of malware over the Internet.
PowerShell attacks are now the preferred weapon of choice for many of these attacks because it provides a number of techniques for bypassing existing security. Not least of all, the ability to run directly in memory and remotely download payloads.
Many Enterprises have specific requirements and applications that need to be white listed to automate the device and these are often included in restricted directories.
BlackFog consists of multiple layers of protection to combat the increasing sophistication of cyber attacks. Using BlackFog's unique outbound network defense strategy it is possible to target the attack and multiple points.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency.
It is important that PowerShell scripts designed to run at startup use the correct techniques so they are not detected as possible threats which use deceptive commands to bypass system security.
When using the BlackFog on more recent Android versions (8.0 or later) you may notice that not all advertising or data collection activities are blocked as they should be.
When using BlackFog on Android and certain Samsung Galaxy S8 and S9 phones the Internet connection appears to be broken and the Google Play store no longer seems to operate normally.