Blog

November 3, 2018

Reverse Malware And Suspect Engineering

Reverse engineering is the process of finding the source code of software and analysing source code to indentify what process it create, which services are used, […]
November 3, 2018

Trojan Detection And Protection

Trojan horse? A Trojan is a malicious computer program that presents itself as legitimate software. it hides malware in a normal file. How are Trojans Spread? […]
November 2, 2018

Anomaly Search And Detection

Anomaly detection is also known as outlier detection. Anomaly detection is the process to identify the observations that are abnormal. On the internet, the new types […]
November 2, 2018

Automatic Discovery Of Advanced Threat

Advanced threats are possible computer threat which is more advanced, persistent and continuous attack on any organization or individual. With the existing method to protection against […]
November 2, 2018

Traffic Hijacking Recovery

Internet routes are being hijacked to serve malware and spam. The hacker can eavesdrop user’s activities and transactions, manipulate data, return falsified information, and redirect user’s […]
November 2, 2018

Command & control server communication detection

Command-and-Control servers are used by attackers to maintain communications with compromised systems within a target network. C&C servers are used to conduct DDoS attack. C&C servers […]
November 2, 2018

OWASP TOP 10 Protection

The Open Web Application Security Project (OWASP) provides unbiased, practical information about application security. OWASP provides guidance to developer and security professionals about the most critical […]
November 2, 2018

Bot Protection

A bot is an automated program that runs over the Internet. Some run automatically, while others only execute commands when they receive specific input. There are […]
November 2, 2018

Information Leakage Prevention

Information leakage is the unauthorized transmission of data from within an organization to an external destination or recipient. Data leakage threats usually occur via the web […]