• Cybersecurity Anatomy

    January 18 2019

    Understanding modern cybersecurity anatomy

    The threat landscape we see today is vastly different and infinitely more sophisticated. The days of protecting yourself from bad actors using a single antivirus solution are now behind us. Fileless network protection is a key element to device security and an important part of the layered security strategy.

  • BlackFog Facebook Data Privacy

    May 28 2018

    Facebook Data Privacy Protection

    With the recent revelation that Facebook tracks you whether or not you are a Facebook customer means that people had no option to opt out of this massive data collection exercise.

  • BlackFog Cryptocurrency Mining Protection

    March 7 2018

    Cryptocurrency Mining Protection

    Cryptocurrency mining is the latest trend in hacking (also called Cryptojacking) where code is injected into web sites and is used to hijack the users’ CPU to mine cryptocurrency. This has been driven by a boom in the value of cryptocoins in general and is a way for hackers to make money.

  • Windows PowerShell Protection

    February 20 2018

    Fileless PowerShell Attacks

    Fileless PowerShell attacks are now the preferred weapon of choice for cyberattacks because they provide a number of techniques around existing security. Not least of all, the ability to run directly in memory and remotely download payloads.

  • Dark Web Protection

    November 6 2017

    Dark Web Protection

    BlackFog recently introduced Dark Web protection to prevent data loss, activation and transfer of malware over the Dark Web. With an exponential increase in activity over the Dark Web over the last 12 months it is crucial that your devices are protected from this new threat. The Dark Web ransomware economy alone is growing by 2,500% annually.

  • Dark Web Protection

    October 16 2017

    BlackFog Enterprise released with Dark Web protection

    Unlike antivirus software which uses signature based techniques, BlackFog Enterprise uses next generation multivariant behavioral analysis to prevent attacks and reduce the total surface area exposed to cyber criminals. This includes blocks based on geography, DNS and network anomalies.

  • Equifax Data Breach

    September 8 2017

    How to protect yourself from the Equifax data breach

    Equifax has reported that hackers compromised data for up to 143 million US consumers and 400,00 UK customers, including Social Security numbers and driver’s license numbers. We explain what you can do to protect your devices as a result of the Equifax data breach.

  • Identity Theft and your right to Privacy

    July 31 2017

    Identity Theft and your right to Privacy

    In a shape of things to come and a follow on effect from Apple removing VPN apps from the App Store in China last week, Russia has just signed into a law a similar ban which takes effect on Nov 1.

  • Petya Cyber Attack

    June 27 2017

    Petya cyberattack hits Europe and is quickly spreading

  • WannaCry Ransomware Attack

    May 12 2017

    WannaCry Ransomware and the NHS attack

    Ransomware continues to escalate globally and targets more and more essential services. This particular attack has been devastating for the UK, knocking out patient records and rendering hospitals completely at its mercy. With no ability to access patient records and essential data patients are being turned away on a large scale.