Whilst the future use and viability of Cryptocurrencies may still be up for debate, the influence Bitcoin (the most famous cryptocurrency) has had on the market is clear– with its valuation peaking at just shy of $20,000 in December 2017.
Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.
Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.
BlackFog recently introduced Dark Web protection to prevent data loss, activation and transfer of malware over the Dark Web. With an exponential increase in activity over the Dark Web over the last 12 months it is crucial that your devices are protected from this new threat. The Dark Web ransomware economy alone is growing by 2,500% annually.
BlackFog now provides the ability to disable third party forensic tools. BlackFog Privacy is the only product on the market which offers this functionality. Installed on millions of computers globally this type of software is used to stop the theft of computers and provide forensic analysis of devices. These products are often used by companies to protect corporate [...]
BlackFog was founded as a solution to the global problem of Data Privacy Protection. Before the advent of rich mobile devices in 2007 with the first iPhone, the concept of losing your computer was considered a major problem for individuals and corporations. Many solutions were developed to try and prevent the theft of these [...]
In the previous article we discussed how Perimeter Defense and Anti-Virus solutions are an important part of your overall security regime to protect your online privacy. These solutions focus specifically on known vulnerabilities rather than zero day defense mechanisms. Just as you go to the doctor once you have a problem, these solutions focus on [...]
Cyber Privacy is an important subset of your computer security regime which includes Anti-Virus, Anti-Malware and perimeter defense tools like Firewalls and Intrusion Prevention Systems (IPS). Most security products today focus on resolving problems based on known vulnerabilities and inbound traffic whereas Privacy is concerned specifically with data loss prevention. This two part series discusses the [...]
Malware, that malicious software that infects our computers may have just found a new distribution mechanism. Traditionally spread through so called Phishing techniques, like emails that promise to make you rich or links to free software, malware is just a fact of life these days.
A sobering message for parents from this latest research from Statista that shows how often teenagers are now online. With 80% of teens online almost constantly or often online we have to be vigilant on ways that we can keep them safe and well educated about how they use the Internet. [...]