Fake Updates: Taking Advantage of Responsible Users
By BUFFERZONE Team, 5/11/2019
These days, even relatively unsophisticated users are aware of the significant dangers posed by computer malware and are aware of the need to protect their assets against it. And one
Read More >PowerShell Exploits: What they are and How to Defend Against Them
By BUFFERZONE Team, 12/02/2019
PowerShell has recently become one of Cybercriminals’ favorite assets to exploit, and security experts are predicting an increase in such exploits. In this article we’ll try to understand PowerShell exploits,
Read More >Emotet: An Example of Evolving Malware
By BUFFERZONE Team, 26/06/2018
The never-ending battle between cybercriminals and the cyber security establishment is well-known even outside the security community, to the general public. Elsewhere, we’ve written about some aspects of this struggle,
Read More >New Windows VBScript Vulnerability: A Case Study
By BUFFERZONE Team, 10/06/2018
This recently-exploited Windows vulnerability, first discovered in April 2018 and officially recognized by Microsoft in May, provides a fascinating glimpse into methods used by malicious attackers, and has some wider
Read More >Cryptojacking: How to Avoid Being a Victim
By BUFFERZONE Team, 24/04/2018
Bitcoin may be down, but it’s far from out – and the charts of many of the over 1,000 cryptocurrencies listed at Bitinfocharts show wild jumps in value. Bitcoin, by
Read More >GDPR-Ready with BUFFERZONE: Preventing PII Data Loss
By BUFFERZONE Team, 16/04/2018
The EU General Data Protection Regulation (GDPR) will take effect on 25 May 2018. “The EU General Data Protection Regulation replaces the Data Protection Directive 95/46/EC and was designed to
Read More >