Protecting communication channels is extremely important for both business and private communications, since any breach can lead to a loss of sensitive information. Most popular messaging apps, including WhatsApp, Viber, and Telegram, use encryption to...
With the growing popularity of the Internet of Things, connected toys are becoming especially loved by children. However, IoT toys still have many vulnerabilities that make them easy targets for cyber attackers. This article provides an overview of...
Lately, an increasing number of companies have been suffering from fileless malware. This type of cyber attack has become so widespread because of its invisibility to traditional anti-malware solutions. Fileless malware runs via legitimate Windows...
The Internet of Things has been one of the fastest developing technology trends in recent years. However, increasing security concerns make many potential adopters refrain from using IoT devices. This article covers the challenges of Internet of Things...
Almost every company needs a solution for protecting its sensitive data and detecting suspicious activity in real time. Besides, when an incident occurs, companies want to be able to provide digital evidence in the courtroom. A security solution that...
An increasing number of unknown threats are forcing the cybersecurity companies to find new approaches to data protection. Market experts are looking to the use of artificial intelligence and machine learning algorithms for cybersecurity as one of the...
In this post, we provide an overview of mobile device management technology including its typical architecture, tips for implementing components, and code examples for Android MDM systems. You will also learn how to make your own mobile device...
Ransomware is one of the fastest-growing threats in the cybersecurity landscape. Nowadays, it feels like a day doesn’t go by without news of another major outbreak of ransomware somewhere in the world. At the time of writing (24 October 2017), a new...
When cyber attacks can shut down entire networks, it’s important to develop an effective solution to protect data against unauthorized access and tampering. Fortunately, blockchain technology offers an innovative approach to data security that has...
This article covers virus detection system testing and is written for quality assurance specialists with no experience in testing malware detection systems. We provide recommendations for organizing your testing process to ensure software quality and...
Protection from zero-day attacks is one of the biggest challenges of modern cybersecurity. Although vendors are getting better and better at detecting zero-day exploits, the number of zero-day attacks and the effectiveness of them keeps increasing....
  In this article we’ll look at how to intercept HTTP traffic in order to inject custom code into Windows HTML markup. In order to do this, we’ll look at two completely different approaches: one with Kernel mode, the other with User mode. For...
  At Apriorit, kernel and driver development is one of our key competences. We extensively use technologies operating at the kernel level in various security, virtualization, system control, and monitoring solutions that we develop for our...
In today’s world, where we constantly use phones and handheld devices, mobile data encryption is extremely important. Unauthorized access to application content or network traffic can lead to leaks of private information and losses, both for individual...
When developing a mobile app, there are no better cyber security guidelines to follow then OWASP Mobile Top 10 Security Risks. In the modern cyber security industry, you would be hard pressed to find people who didn't hear about The Open Web...
Software is never made perfect and developers can never account for everything. There will always be errors and misses, some of them more prominent than others. Malicious perpetrators often exploit such vulnerabilities to get control over the software...
Nowadays, it is hard to imagine life without mobile devices. We use them everywhere to facilitate our lifestyle. They help us to communicate with each other, have fun, and even make purchases. We use them at home and at work. These devices accompany us...
Protection of the sensitive date stored on the mobile devices is a hot topic. There are a huge number of apps that provide access to the corporate (confidential) data, banking and payment tools, social networks and many other web-services, where user...
Often companies developing ParentalControl or DLP solutions require access to private data from software, installed on Android devices. For example, messages from Skype/KIK/Viber, etc., or even an access to a browsing history are both good examples of...
This article covers the topic of email server security. Security measures covered here will allow you to greatly increase the level of protection of your email server and prevent any successful attacks.