The threat landscape we see today is vastly different and infinitely more sophisticated. The days of protecting yourself from bad actors using a single antivirus solution are now behind us. Fileless network protection is a key element to device security and an important part of the layered security strategy.
BlackFog announces distribution agreement with DCC, a global IT distributor headquartered in Denmark, to resell BlackFog’s cyber security solution. With over 3000 customers in more than 70 countries they specialize in surplus computer hardware, shipping around 100,000 units annually.
When using BlackFog on Android and certain Samsung Galaxy S8 and S9 phones the Internet connection appears to be broken and the Google Play store no longer seems to operate normally.
The world has moved to a mobile device based economy, with focus around data creation, storage, cloud servers and information sharing. The idea of losing your device has become secondary to the information that is stored on it. We discuss the evolution of BlackFog and why outbound data monitoring is so important.
Most security products focus on resolving problems based on known vulnerabilities and inbound traffic whereas data and identity theft protection is concerned specifically with data loss prevention. We discuss the different types of defense mechanisms available and contrast BlackFog's approach.
Mobile devices now total 5.1 billion users, penetrate 68% of the world population and represent 52% of global web traffic. More than half of these are ‘smart’ devices with Internet access. iOS now represents 1.3 billion active devices. It is no wonder that cyber criminals specifically target mobile devices.
BlackFog Privacy Release Notes for Android
BlackFog Privacy Enterprise Release Notes
When using the BlackFog on more recent Android versions (8.0 or later) you may notice that not all advertising or data collection activities are blocked as they should be.
When installing BlackFog it automatically creates a service in order to operate correctly on your system. If the user account has been modified by a system administrator the installer may fail to create and execute the service under you local account. You will see the message "Verify that you have sufficient privileges to install [...]