5 Ways an Application Sandbox Protects Endpoints, Users & Networks
By BUFFERZONE Team, 22/03/2016
For years, banks, airports, government buildings, and other secure facilities have used zone-based physical security (a.k.a. “buffer zones”) to keep assets safe. Yet, what happens when the context shifts from
Read More >Macro Malware Strikes Again – and How You Can Avoid Getting Hit
By BUFFERZONE Team, 3/02/2016
In their quest to hack as many victims as possible while expending the least amount of effort, some cyber criminals have decided that instead of creating sophisticated and complex new
Read More >Malware Mania: the More Things Change, the More They Stay the Same
By BUFFERZONE Team, 26/01/2016
The startling headlines scream out like something from the front page of a supermarket tabloid: “Terrifying New Malware on the Loose!”, “First-Ever Cyber Menace Spotted in the Wild”, “Cyber Criminals
Read More >Conficker Redux: Is Your Network Security Ready?
By BUFFERZONE Team, 6/01/2016
The notorious Conficker worm (a.k.a. Downup, Downadup and Kido) first reared its malicious head in 2008 – which makes it virtually prehistoric.
Read More >FBI to Ransomware Victims: “Pull Out Your Credit Card Instead of Calling the Cyber Cops”
By BUFFERZONE Team, 3/11/2015
It’s a Bird…it’s a Plane…it’s a Cost-Benefit Analysis? It’s the equivalent of a superhero telling distraught citizens that they just need to “suck it up” and tolerate some relatively minor
Read More >3 Critical Insights of the Target Breach – and 3 Key Takeaways
By BUFFERZONE Team, 13/10/2015
KrebsOnSecurity has obtained an internal report commissioned by Target that investigated the giant retailer’s headline-grabbing data breach in 2013 — and the findings so far are a chilling, cautionary tale
Read More >