Trustaira Blog
October 8, 2017        Trustaira Staff

Apple released its major fourteenth release of macOS name High Sierra on September 25, 2017. Which is targeted for desktop and server operating system running on Mac computers. It was designed to improve on the previous macOS operating system with some major upgrades and changes. Such as introducing new file system called Apple File System (APFS), a replacement for existing HFS+ system. Also improving its existing Graphic…

Read More »

 
May 21, 2017        Trustaira Staff

In the wake of recent wave of attack and continuous increased news of founding malicious application in PlayStore,  Google has decided to add a new layer of security defense for its android user named Google Play Protect. What’s it’s about? Let’s hear it from Google first. “Backed by the strength of Google, Play Protect brings control to your fingertips while giving guidance along the way….

Read More »

 
May 16, 2017        Trustaira Staff

It is no secret the number of cyber-attacks is on the rise. As more time goes by, cyber criminals are becoming more sophisticated with nature of attacks.  So, we always need to stay alert on this issue as our dependency over technologies is increasing day by day. Usually financial sector, along with energy and national defense sectors, is most affected one from this phenomena.  NOW…

Read More »

 
May 1, 2017        Trustaira Staff

A security analyst has unveiled security flaws in the third-party API used by Symantec certificate partners. This Symantec API flaw can allow the attackers to retrieve SSL certificates including private keys. The Symantec API flaw was first found by Chris Byrne, a data security specialist and instructor for Cloud Harmonics. He discussed the details in his Facebook post.   Symantec API flaw exposes SSL certificates…

Read More »

 
April 8, 2017        Trustaira Staff

As you can see in the above image, Application Processor (AP) is at core of the system of any modern mobile platform. As it is getting most of the attention from security researchers, attackers has been gradually shifting their attention to other less-attended parts such as sensors, camera or Wi-Fi & BT System on a Chip (SoC). Today we going to focus on Wi-Fi System…

Read More »