Trustaira Blog
September 12, 2018        Trustaira Staff

We have become all  familiar with the type of hacker who leverages their technical expertise to penetrate protected IT and digital systems and compromise sensitive data. We hear about this type of hacker in the news regularly, and we are motivated to counter their exploits by investing in new technologies that will bolster our network defenses. However, there is another type of hacker who can use…

Read More »

 
September 5, 2018        Trustaira Staff

New Trojan named CamuBot especially targeting commercial Bank users has been used to steal money from business customers in Brazil. IBM x-force engineers who first tracked it down and reported it, identified the new Trojan highly sophisticated and very much different in how it operates comparing it previous financial Trojans like TrickBot, Dridex or QakBot. Camubot first appeared in Brazil in early august of 2018….

Read More »

 
April 29, 2018        Trustaira Staff

The acronym SQL (pronounced SEQUEL) stands for Structured Query Language, a language for querying and editing information stored in a certain database management system. SQL was developed in the early 1970s by some people working for IBM. Short after that, in 1979, a company called Relational Software, which later became Oracle Corporation,  released its own modified version of SQL. Today, SQL is used in many products, including…

Read More »

 
April 27, 2018        Trustaira Staff

For last couple of years, we have seen a number of major cyber attacks, malware and randsomeware attacks. Victims has mostly have been the traditional financial organizations. From the beginning of the current year, we notice a rapid change in the cyber threat landscape.   As cyptocurrency is becoming more and more popular day by day, it is getting attention from everybody including the hackers….

Read More »

 
February 20, 2018        Trustaira Staff

  A malicious insider is a trusted insider who abuses his/her privileges in a system to hinder the system’s operations, damage data, or disclose sensitive information which causes damage to the system. Malicious insider threat is one of the most dangerous threats to any organization. By being an insider, he/she have already gotten past your first defense and they might be interested by a desire…

Read More »