Trustaira Blog
March 28, 2017        Trustaira Staff

Greetings! Today were are here with the details about a very risky malware. Cyber threat landscape is changing rapidly every day. It is an undeniable fact that cyber criminals are becoming more organized, skilled and innovative as technology progresses.  These hackers are taking better strategic approaches and becoming more sophisticated and creative in their methods of attack. New attack patterns are having stealthier techniques that…

Read More »

 
March 7, 2017        Trustaira Staff

News of data breach, security leak and system vulnerability incidents have been occurring almost every day in this year. Unfortunately, here comes another BIG ONE!  On a dark web marketplace, someone is selling millions of Gmail and Yahoo accounts. These accounts include personal information such as usernames, emails and their passwords in a plain text format. In the last few months, we have heard of several…

Read More »

 
March 1, 2017        Trustaira Staff

What Is Caller ID Spoofing?  Public telephone networks usually provide Caller ID information to the receiver during call these days. Caller ID information includes the caller’s name and phone number. However modern technologies like VoIP can allow callers to forge Caller ID information and present false information to the receivers. Gateways between networks allow such spoofing and the adjacent public networks then forward this false…

Read More »

 
February 28, 2017        Trustaira Staff

As we mentioned in a previous article, Windows OS have some serious security issues that need to be fixed. Unfortunately for the users, Microsoft decided to skip their last monthly update scheduled for this February. The monthly release of security fixes from Microsoft is formally known as Patch Tuesday. Usually, Microsoft issues the updates around 10 a.m. PT (1 p.m. ET) during second Tuesday of…

Read More »

 
February 18, 2017        Trustaira Staff

Address Space Layout Randomization, simply known as ASLR, is a memory protection technique. Almost all the Operating Systems use ASLR to guard themselves from different malicious attacks such as Buffer-Overflow. It randomizes the locations where programs run in a device’s memory. It makes it difficult for attackers to execute malicious payloads in specific spots of memory when trying to exploit the system. For years, this…

Read More »