aleph_tav_technologies_androidapps_backdoor

Protect Your Android Apps from Backdoor

The Android operating system influences OS security controls to protect user data, system resources, device integrity against malware, and provides application isolation. Android devices which contains firmware is vulnerable through a debugging feature left inside the bootloader acts as a backdoor and bypasses the authentication procedures. A backdoor is a security risk because there are […]

Remove Cerber Ransomware

Cerber on the prowl: Spiking Ransomware raises the bar on Endpoint Threat Visibility

As if a blaring message that said, “Your files are encrypted!” wasn’t scary enough, the cybercrime group behind the Cerber Ransomware sends victims a cryptic audio message with instructions to pay up around 1.24 bitcoins for decryption. Cerber, the encryptor named after the mythological beast Cerberus, is sold through some covert Russian channels and has now been […]

Aleph Tav Technologies IDS and SIEM

Protect your enterprise users from watering hole attacks

Never trust a threat level meter that puts a watering hole attack and a drive-by attack under the same risk rating. No matter how much it seems to play out like its indiscriminate cousin (the drive-by attack), watering hole attacks are absolutely targeted. What’s worse, these are the kinds of attacks that use intelligence gathering […]

Aleph tav Technologies - Protect against ransomware

Ransomware – Is it the new blackmail?

Imagine you have to leave your home on account of an emergency. There’s no one but your faithful nanny to take care of your house and your baby in your absence. You place your trust in your nanny and leave for the emergency only to return and find yourself locked out of your house with […]