Trustaira Blog
May 14, 2017        Trustaira Staff

Update 5 (Monday 16.05.2017 BDT): Now you can add Bangladesh officially to the list of affected countries suffering from this ransomware. Number of affected workstation or laptops varies from 30-50. If you still haven’t install patches that has been released to solve this issue. Please do it now. And refrain yourself from clicking any link coming through mail unless you are absolutely sure of its authenticity…

Read More »

 
May 1, 2017        Trustaira Staff

A security analyst has unveiled security flaws in the third-party API used by Symantec certificate partners. This Symantec API flaw can allow the attackers to retrieve SSL certificates including private keys. The Symantec API flaw was first found by Chris Byrne, a data security specialist and instructor for Cloud Harmonics. He discussed the details in his Facebook post.   Symantec API flaw exposes SSL certificates…

Read More »

 
April 8, 2017        Trustaira Staff

As you can see in the above image, Application Processor (AP) is at core of the system of any modern mobile platform. As it is getting most of the attention from security researchers, attackers has been gradually shifting their attention to other less-attended parts such as sensors, camera or Wi-Fi & BT System on a Chip (SoC). Today we going to focus on Wi-Fi System…

Read More »

 
April 4, 2017        Trustaira Staff

Previously, there were report about infecting android devices with malware through the Apps downloaded from Android Stores.  It is only getting worse with time. Recently android devices of various vendors were found with pre-installed malware. They were discovered to be loaded with malwares pre-installed somewhere along the supply chain. Check Point Software Technologies said that it found that 38 Android handsets were infected with adware, information-stealing malware…

Read More »

 
April 4, 2017        Trustaira Staff

What is a Trojan Horse Attack? A Trojan horse, often shortened to Trojan, is a type of malware designed to provide unauthorized, remote access to a user’s computer. Suppose you are working in a Bank and you have a communication system like Viber or Whats app to communicate with other colleagues. One day a new message with Hyper Text Link came to your inbox from…

Read More »