The Spectre of Un-Patchable Hardware Haunts Us All — Don’t Meltdown!

Specter and Meltdown hacks

Ofttimes it has been difficult to explain the role of software protection in hardware-protected secure systems, but recently security researchers have helped us out by providing many examples of zero-day exploits where flaws that are baked into hardware or firmware lead to exploitable vulnerabilities in systems. In this article we are having a look at Spectre & Meltdown and explore how these attacks could have been avoided using application protection technology.

Make Yourself Less of a Target – A multi-layered Approach to Application Shielding

How the Target hack could have been prevented using Application Shielding technology

Some of you will remember the Target and Home Depot cyberattacks in 2013 & 2014, which resulted in $202 million (Sruthi Ramakrishnan, 2017) and $134.5 million USD (Roberts, 2017) of damages respectively. In this blog article, let’s examine these and other infamous hacks in detail to glean important lessons about system and application security.

Is 5G the superhighway for cybercrime?

We live in an always connected world. So much so that in The Netherlands they’ve put the red ‘don’t walk’ light on the ground as people are so engrossed looking down at their mobile device. If you ask how wireless connectivity can be improved: it’s faster download, quicker response and more reliable connection. According to its promise 5G will deliver all that and more! Great news for consumers. But will it be the cybercriminals who are real winners?