Trustaira Blog
February 20, 2018        Trustaira Staff

  A single character is all needed to bring down your Apple Devices. This new bug is so easy to exploit.   Just recently Apple fixed a bug called “chaiOS” that would let attackers freeze/crash apple devices by sending a text message with a simple link. Now they have faced another similar problem. Italian Blog Mobile World was first to spot this new bug. This problem arises from…

Read More »

 
February 1, 2018        Trustaira Staff

The use of mobile and hand-held devices reaches at an all-time high. Mobile Banking Security risk is very high as well. According to a KPCB (Kleiner Perkins Caufield & Byers) report, mobile digital media is now outpacing desktop usage. The report stated that adults with access to digital media use mobile 51 percent of the time compared to 42 percent for desktop usage and 7…

Read More »

 
January 28, 2018        Trustaira Staff

During an internal security audit, security experts at Levono have identified a firmware backdoor in RackSwitch and BladeCenter networking switch families. This China based company released firmware updates during 2nd week of this January 2018 to fix this network switch backdoor.   Backdoor Added in 2004 in ENOS The firmware that powers some Lenovo and IBM RackSwitch and BladeCenter switches is known as The Enterprise Network…

Read More »

 
November 7, 2017        Trustaira Staff

Tor is hugely popular among internet users who wants to remain anonymous while browsing various website. People who are concerned about invasion of their privacy uses tor along with different VPN solution. The least one can expects Tor to do is hide their original IP address while using internet. So it may come to you as surprise, a recent vulnerability has been found in Tor,…

Read More »

 
July 13, 2017        Trustaira Staff

A new malware has been revealed by “Check Point” recently which has attacked more than 15 million android device around the world, rooting phones and hijacking apps to make millions in fraudulent ad revenue. The name of this catastrophic Cyber threat for Android is ‘CopyCat’. How Your Phone Gets Affected? CopyCat impersonate itself a popular application on Third Party App Store that people are downloaded…

Read More »