Trustaira Blog
August 13, 2017        Trustaira Staff

If you are a GOT (Game of Throne) Fan, there is a good chance that you already know the story. Hackers have recently hacked into HBO network and stole valuable data such as episodes of TV-shows along with scripts, and documents containing employee information. They allegedly have stolen data of few TeraBytes from HBO network. Subsequently dropped upcoming episodes of very well-known TV series such as Ballers and Room…

Read More »

 
July 13, 2017        Trustaira Staff

A new malware has been revealed by “Check Point” recently which has attacked more than 15 million android device around the world, rooting phones and hijacking apps to make millions in fraudulent ad revenue. The name of this catastrophic Cyber threat for Android is ‘CopyCat’. How Your Phone Gets Affected? CopyCat impersonate itself a popular application on Third Party App Store that people are downloaded…

Read More »

 
May 21, 2017        Trustaira Staff

In the wake of recent wave of attack and continuous increased news of founding malicious application in PlayStore,  Google has decided to add a new layer of security defense for its android user named Google Play Protect. What’s it’s about? Let’s hear it from Google first. “Backed by the strength of Google, Play Protect brings control to your fingertips while giving guidance along the way….

Read More »

 
May 16, 2017        Trustaira Staff

It is no secret the number of cyber-attacks is on the rise. As more time goes by, cyber criminals are becoming more sophisticated with nature of attacks.  So, we always need to stay alert on this issue as our dependency over technologies is increasing day by day. Usually financial sector, along with energy and national defense sectors, is most affected one from this phenomena.  NOW…

Read More »

 
May 16, 2017        Trustaira Staff

It is 2017, and opening a simple document file may  compromise your system! We are witnessing an ongoing multi-phase ransomware attack all around the world. It may get even worse! A zero-day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is…

Read More »