Home Digital Asset Security

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in rever… Continue reading Home Digital Asset Security

Home Router…, or Trojan Horse?

Home Router…, Trojan Horse? The world of cybersecurity is full of stories of technology secretly encroaching on our privacy. The most common attack comes from malware that we enable hackers to store on our computers or mobile devices. Most of us … Continue reading Home Router…, or Trojan Horse?

Top 12 Allot Blogs of 2018

Top 12 Allot Blogs of 2018 With 2018 behind us, and 2019 picking up momentum, we thought you might be interested to see a list of the Top 12 Allot Blogs of 2018. We hope that you can find the time to read through this cyber compendium—you never k… Continue reading Top 12 Allot Blogs of 2018

How to Prevent Connected Carjacking

Most people reading this article will drive a connected car, which is essentially a car that can link to the Internet. GPS enables us to navigate through unknown territory. Smart radio selects our favorite music channels to play on our entertainments s… Continue reading How to Prevent Connected Carjacking

What is Fileless Malware?

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access … Continue reading What is Fileless Malware?

FBI IoT Alert—But Have They Got It Right?

FBI Cyber Alert—But Are They Right? On August 2nd, 2018, the US Federal Bureau of Investigation (FBI) issued the following Public Service Announcement: “Cyber Actors Use Internet of Things Devices as Proxies for Anonymity and Pursuit o… Continue reading FBI IoT Alert—But Have They Got It Right?