
Cheyenne, Wyoming, October 7, 2019. BlackFog, Inc. today announced the release of BlackFog Privacy for Windows v4.0, its next generation data privacy and cybersecurity solution for Windows. Focusing specifically on on-device cybersecurity and data exfiltration, BlackFog is able to block threats in real-time and prevent the activation of malware over the network including ransomware, spyware and crypto-jacking. By geo-locating traffic BlackFog can detect when malicious activity is taking place using behavioral profiling and 12 different layers of protection.
BlackFog has gathered feedback from thousands of customers over the last year and has incorporated a number of new features. Version 4.0 includes a completely redesigned user interface designed to provide faster access to existing and new product features. The new process monitoring feature allows introspection of any process, enabling BlackFog to terminate applications exhibiting suspicious activity. CPU activity has also been reduced to less than 1% which will improve battery life for mobile devices such as laptops and tablets running BlackFog.
To cope with the ever growing number of new threats, BlackFog has also added double execution prevention to protect against malicious extensions such as pdf.exe, png.exe, xls.com and hundreds of other combinations. In addition, shadow copy protection prevents deletion by rogue processes, a common technique employed by malware.
BlackFog 4.0 is available for download immediately from the company website. In addition to Windows, BlackFog is also available for MacOS, iOS and Android. An Enterprise edition is also available for remote management of all devices within an organization through its global distributor and reseller network. For enquiries please contact BlackFog directly.
About BlackFog
BlackFog is the leader in on device data privacy, data security and ransomware prevention. Our behavioral analysis and data exfiltration technology stops hackers before they even get started. Our cyberthreat prevention software prevents ransomware, spyware, malware, phishing, unauthorized data collection and profiling and mitigates the risks associated with data breaches and insider threats. BlackFog blocks threats across mobile and desktop endpoints, protecting organizations data and privacy, and strengthening regulatory compliance.
To learn more about BlackFog visit www.blackfog.com.
Share This Story, Choose Your Platform!
Related Posts
Kerberoasting Attack Explained: Example And Prevention Guide
Kerberoasting attack explained with examples, detection tips, and prevention steps. Learn how to secure Active Directory from credential theft.
BlackFog Appoints Former Yahoo CFO Kenneth A. Goldman To Board Of Advisors
Kenneth A. Goldman joins BlackFog’s Board of Advisors, bringing decades of tech and finance leadership to accelerate enterprise growth and AI-based data protection.
Why Every Business Needs A Cybersecurity Roadmap
Find out what's involved in creating a cybersecurity roadmap and how having one can help navigate an extremely challenging threat landscape.
Cybersecurity Risk Assessment: Why It Matters And How To Do It Right
What do you need to complete a successful cybersecurity risk assessment and how can outsourced solutions like a virtual CISO aid in the process?
5 Effective Ways To Mitigate Risk In Cybersecurity
Follow these five proven strategies to help your firm mitigate risk in cybersecurity and ensure effective protection in today’s challenging digital environment.
How Do vCISO Costs Work – And What Do Firms Get In Return?
How much should businesses expect in vCISO costs? This guide breaks down the key factors that influence pricing and what drives those cost variations.






