Trustaira Blog
September 12, 2018        Trustaira Staff

We have become all  familiar with the type of hacker who leverages their technical expertise to penetrate protected IT and digital systems and compromise sensitive data. We hear about this type of hacker in the news regularly, and we are motivated to counter their exploits by investing in new technologies that will bolster our network defenses. However, there is another type of hacker who can use…

Read More »

 
November 7, 2017        Trustaira Staff

Tor is hugely popular among internet users who wants to remain anonymous while browsing various website. People who are concerned about invasion of their privacy uses tor along with different VPN solution. The least one can expects Tor to do is hide their original IP address while using internet. So it may come to you as surprise, a recent vulnerability has been found in Tor,…

Read More »

 
August 13, 2017        Trustaira Staff

If you are a GOT (Game of Throne) Fan, there is a good chance that you already know the story. Hackers have recently hacked into HBO network and stole valuable data such as episodes of TV-shows along with scripts, and documents containing employee information. They allegedly have stolen data of few TeraBytes from HBO network. Subsequently dropped upcoming episodes of very well-known TV series such as Ballers and Room…

Read More »

 
July 13, 2017        Trustaira Staff

A new malware has been revealed by “Check Point” recently which has attacked more than 15 million android device around the world, rooting phones and hijacking apps to make millions in fraudulent ad revenue. The name of this catastrophic Cyber threat for Android is ‘CopyCat’. How Your Phone Gets Affected? CopyCat impersonate itself a popular application on Third Party App Store that people are downloaded…

Read More »

 
May 16, 2017        Trustaira Staff

It is 2017, and opening a simple document file may  compromise your system! We are witnessing an ongoing multi-phase ransomware attack all around the world. It may get even worse! A zero-day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is…

Read More »