Trustaira Blog
March 28, 2017        Trustaira Staff

Greetings! Today were are here with the details about a very risky malware. Cyber threat landscape is changing rapidly every day. It is an undeniable fact that cyber criminals are becoming more organized, skilled and innovative as technology progresses.  These hackers are taking better strategic approaches and becoming more sophisticated and creative in their methods of attack. New attack patterns are having stealthier techniques that…

Read More »

 
March 7, 2017        Trustaira Staff

In the past, having a secure website was not considered necessary for websites dealing with confidential, sensitive and financial information. Now a lot of things have changed.  Almost everyday malicious cyber crimes are happening. Say, you are using your smartphone on a public WiFi connection in an airport. When you view some insecure website (those using only HTTP) you run a higher risk of having…

Read More »

 
March 1, 2017        Trustaira Staff

What Is Caller ID Spoofing?  Public telephone networks usually provide Caller ID information to the receiver during call these days. Caller ID information includes the caller’s name and phone number. However modern technologies like VoIP can allow callers to forge Caller ID information and present false information to the receivers. Gateways between networks allow such spoofing and the adjacent public networks then forward this false…

Read More »

 
February 28, 2017        Trustaira Staff

As we mentioned in a previous article, Windows OS have some serious security issues that need to be fixed. Unfortunately for the users, Microsoft decided to skip their last monthly update scheduled for this February. The monthly release of security fixes from Microsoft is formally known as Patch Tuesday. Usually, Microsoft issues the updates around 10 a.m. PT (1 p.m. ET) during second Tuesday of…

Read More »

 
February 7, 2017        Trustaira Staff

SMB or Server Message Block is used for providing access (i.e. to read or write) to files, various services such as printer, serial ports and such. It has been vastly used in windows operating systems. It is also known as “Microsoft Windows Network” on windows platform. Using this protocol, one can access remote server as well. Anyway, recently a severe security flaw was found in…

Read More »