[email protected] +603-2181 3666
Extol Threat Intelligent Notification
‘Adult’ video for Facebook users
October 17, 2016

In April of this year, we registered some mass attacks on Facebook users in Russia. As a result, many Russian-speaking users of the social network fell victim to fraudsters. Half a year later the fraudsters have used the same tactics to attack Facebook users in Europe. The attackers use a compromised Facebook account to post […]

How can you prevent a manufacturing sabotage from becoming an IT disaster? Securing your company’s network with the right protection measures isn’t always enough. Of course you should install an adequate protection system and ensure that your employees use robust passwords. However, there is something that we cannot control: the manufacturing process. Did you know that your business’s computers […]

There are dozens of messaging apps available for your smartphone, each with its own strong points. This guide will help you understand which are the best – and how to use each one securely. Best for – Apple users Built into every iPhone and iPad as standard, Apple’s iMessage app is a safe and secure […]

BlackBerry used to define the Smartphone sphere. Once popular for its physical keyboard and exclusive-for-users IM service, now BlackBerry has been left out in the cold. The Canadian company recently announced that they will no longer make the devices. However, they will continue to market the phones that will be manufactured by other companies. So, why buy a BlackBerry […]

75 million smartphones in the US don’t have their passwords set on TransUnion’s latest Cyber Security Survey confirmed that Americans who feel extremely or very concerned about cyber threats have increased 20 percent since last year – from 46 percent in 2015 to 55 percent in 2016. Fears are legitimate – hacking and cyber security […]

CryPy: ransomware behind Israeli lines
October 13, 2016

A Tweet posted recently by AVG researcher, Jakub Kroustek, suggested that a new ransomware, written entirely in Python, had been found in the wild, joining the emerging trend for Pysomwares such as the latest HolyCrypt, Fs0ciety Locker and others. This Python executable comprises two main files. One is called boot_common.py and the other encryptor.py. The […]

We are always talking about ransomware and the importance of keeping your corporate network protected, and we want to warn our readers about the popular Trojan attacks that are going after small and medium sized businesses. But how do you know when it’s a Trojan? How can you secure yourself against Trojans? 5 Things You Should Know They are […]

Machine learning has long permeated all areas of human activity. It not only plays a key role in the recognition of speech, gestures, handwriting and images – without machine learning it would be difficult to imagine modern medicine, banking, bioinformatics and any type of quality control. Even the weather forecast cannot be made without machines […]

1 52 53 54 55 56 157