When installing BlackFog it automatically creates a service in order to operate correctly on your system. If the user account has been modified by a system administrator the installer may fail to create and execute the service under you local account. You will see the message "Verify that you have sufficient privileges to install [...]
When using macOS Mojave with BlackFog it is important to allow "Full Disk Access" to the application in order for it to correctly detect and remove malware. To do this it is necessary to open the "Security and Privacy" System Preferences. Once opened, scroll down to Full Disk Access and click the + button [...]
3.2.0 - October x, 2018 (In App Store Review) Removed block warnings when clicking on Ads shown in Google Search Changed Enterprise license handling Added Turkish translation Updated threat rules 3.1.0 - August 13, 2018 Added Fake News blocking option Added Safari Action extension to whitelist while browsing Added new advertising [...]
When running software update from the Help menu the system returns with a message saying that the software signatures don't match. This error can happen if you are using versions of BlackFog prior to 3.5.1 which introduced a certificate change to the main application to support Microsofts new signing policies. The solution is to [...]
With the recent revelation that Facebook tracks you whether or not you are a Facebook customer means that people had no option to opt out of this massive data collection exercise.
It is important that PowerShell scripts designed to run at startup use the correct techniques so they are not detected as possible threats which use deceptive commands to bypass system security.
Fileless network protection is a key element to device security and is an important part of a layered approach to security. The days of protecting yourself from bad actors using AntiVirus (AV) solutions are behind us.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.
The EU General Data Protection Regulation (GDPR) is a significant piece of European legislation which will come into force on May 25, 2018. It builds on existing data protection laws, strengthening the rights that EU individuals have over their personal data, and creating a single data protection approach across Europe.